Sample records for manager database authentication

  1. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  2. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  3. Database Management Certificate Program

    E-Print Network [OSTI]

    Rose, Michael R.

    Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

  4. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  5. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  6. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  7. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  8. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  9. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  10. CIS 330: Database Management Systems Course Number & Title (A.1) CIS 330: Database Management Systems

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    CIS 330: Database Management Systems Course Number & Title (A.1) CIS 330: Database Management & Johannes Gehrke, Database Management Systems (third edition), McGraw Hill. Additional materials as handouts, e.g., research papers Catalog Description (A.5a) Introduction to database management systems

  11. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design ofSouthwesternAUTHENTICATED

  12. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  13. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...

  14. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  15. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Database Management Systems

    E-Print Network [OSTI]

    Li, Yanjun "Lisa"

    What Is a DBMS? A database is a collection of data. Models real-world enterprise, e.g. university System (DBMS) is a software package designed to store and manage databases. #12;Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 3 Why we need DBMS Huge amount of data is available. Users need

  16. EERE Project Management Center Database PIA, The Office of Energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management Center Database PIA, The Office of Energy Efficiency and Renewable Energy (EERE) EERE Project Management Center Database PIA, The Office of Energy Efficiency and...

  17. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  18. The design and implementation of the buffer manager for an experimental relational database management system

    E-Print Network [OSTI]

    Li, Zaichun

    1994-01-01T23:59:59.000Z

    Buffer management is an essential component of database management. This thesis presents a design and implementation of the buffer manager for an experimental relational database management system. The relationship and difference between database...

  19. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypass Vulnerability

  20. Proposed database model and file structures for arthropod collection management

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Proposed database model and file structures for arthropod collection management Ronald A for taxonomic analysis or behavioral, physiological, and ecological information. The database model described how specific computerization projects can be related to each other. The proposed database model

  1. CS 525: Advanced Database Organization Study of relational, semantic, and object-oriented data models and interfaces. Database management system

    E-Print Network [OSTI]

    Heller, Barbara

    CS 525: Advanced Database Organization Objectives Study of relational, semantic, and object-oriented data models and interfaces. Database management system techniques for query optimization, concurrency History of database management. Goals of database system development. Relational systems Data models

  2. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins; John M. Beck

    2011-11-01T23:59:59.000Z

    The Next Generation Nuclear Plant (NGNP) Risk Management System (RMS) is a database used to maintain the project risk register. The RMS also maps risk reduction activities to specific identified risks. Further functionality of the RMS includes mapping reactor suppliers Design Data Needs (DDNs) to risk reduction tasks and mapping Phenomena Identification Ranking Table (PIRTs) to associated risks. This document outlines the basic instructions on how to use the RMS. This document constitutes Revision 1 of the NGNP Risk Management Database: A Model for Managing Risk. It incorporates the latest enhancements to the RMS. The enhancements include six new custom views of risk data - Impact/Consequence, Tasks by Project Phase, Tasks by Status, Tasks by Project Phase/Status, Tasks by Impact/WBS, and Tasks by Phase/Impact/WBS.

  3. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins

    2009-09-01T23:59:59.000Z

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  4. Managing and Querying Transaction-time Databases under Schema Evolution

    E-Print Network [OSTI]

    Zaniolo, Carlo

    Managing and Querying Transaction-time Databases under Schema Evolution Hyun J. Moon UCLA hjmoon of a relational database in XML, whereby the evolution of the schema and its underly- ing database are given is that schema evolution is transparent to the user: she writes queries against the current schema while

  5. Flash Device Support for Database Management Philippe Bonnet

    E-Print Network [OSTI]

    a DBMS to explicitly control IO behavior. We believe that these approaches are natural evolutions have a reference DBMS design nor a performance model for flash devices: database researchers devices should support database management. We ad- vocate that flash devices should provide DBMS with more

  6. Storage Management for Object-Oriented Database Management Systems: A Comparative Survey

    E-Print Network [OSTI]

    Waterloo, University of

    Storage Management for Object-Oriented Database Management Systems: A Comparative Survey David Dueck, Yiwen Jiang, and Archana Sawhney Contents 1 Introduction * * 71 2 The O2 Object Manager 71 2.1 Object

  7. Managing a Relational Database with Intelligent Agents Ira Rudowsky1

    E-Print Network [OSTI]

    Rudowsky, Ira

    Managing a Relational Database with Intelligent Agents Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin quality for search and retrieval. An intelligent agent was designed using JACKTM (Agent Oriented Software in genomic studies, which could impact data analysis and further research [9, 10]. A number of software tools

  8. Workload Class Importance Policy in Autonomic Database Management Harley Boughton

    E-Print Network [OSTI]

    to resource allocation decisions in a database management system (DBMS). We focus on business policies that describe the relative importance of competing workloads on a DBMS. We present experiments with a simulation can be used to effectively allocate main memory resources in a commercial DBMS. 1. Introduction

  9. Design, implementation, and benchmarking of a file manager for a relational database management system on a raw UNIX disk

    E-Print Network [OSTI]

    Narayanan, Pudugramam Shanker

    1994-01-01T23:59:59.000Z

    The file management component of a database management system (DBMS) has to be tailor designed to meet the performance demands of large database applications. The operating system (OS) file systems are typically not suitable for storing...

  10. The Oil and Natural Gas Knowledge Management Database from NETL

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Knowledge Management Database (KMD) Portal provides four options for searching the documents and data that NETL-managed oil and gas research has produced over the years for DOE’s Office of Fossil Energy. Information includes R&D carried out under both historical and ongoing DOE oil and gas research and development (R&D). The Document Repository, the CD/DVD Library, the Project Summaries from 1990 to the present, and the Oil and Natural Gas Program Reference Shelf provide a wide range of flexibility and coverage.

  11. Scientific Workflow Management by Database Management Anastassia Ailamaki Yannis E. Ioannidis Miron Livny

    E-Print Network [OSTI]

    Ailamaki, Anastassia

    and their interrelationships. Current Workflow Manage- ment Systems (WFMSs) use a Database Management Sys- tem (DBMS) to store task descriptions, and implement all workflow functionality in modules that run on top of the DBMS. Motivated by scientific workflows, we propose a much more DBMS-centric architecture, in which conven- tional

  12. Anonymous, authentic, and accountable resource management based on the E-cash paradigm

    E-Print Network [OSTI]

    Lam, Tak Cheung

    2009-05-15T23:59:59.000Z

    AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

  13. A Simple Swap Technique and Enhanced GTT Location Database Management Kuo-Hsing Chiang Nirmala Shenoy

    E-Print Network [OSTI]

    Shenoy, Nirmala

    implemented in the current mobile networks are ETSI GSM MAP [1] and EIA/TIA IS-41 [2]. The two- level databaseA Simple Swap Technique and Enhanced GTT Location Database Management Scheme Kuo-Hsing Chiang and provides comparison results with other location database management schemes. The performance results

  14. Center for Ecological Management of Military Lands 1 LCTA Relational Database

    E-Print Network [OSTI]

    Center for Ecological Management of Military Lands 1 LCTA Relational Database Center for Ecological Management of Military Lands No. 5 - 1997 The LCTA data is stored in a relational database, currently SQLBase from Gupta Technologies Inc. To the inexperienced user the LCTA database can seem very complex with 45

  15. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  16. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  17. Development of Energy Consumption Database Management System of Existing Large Public Buildings 

    E-Print Network [OSTI]

    Li, Y.; Zhang, J.; Sun, D.

    2006-01-01T23:59:59.000Z

    The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy...

  18. Development of Energy Consumption Database Management System of Existing Large Public Buildings

    E-Print Network [OSTI]

    Li, Y.; Zhang, J.; Sun, D.

    2006-01-01T23:59:59.000Z

    The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy...

  19. A Flexible Image Retrieval and Multimedia Presentation Management System for Multimedia Databases

    E-Print Network [OSTI]

    Chen, Shu-Ching

    A Flexible Image Retrieval and Multimedia Presentation Management System for Multimedia Databases, multimedia data is becoming more and more common in daily applications, however this data is nearly useless. In this demonstration, we present a multimedia query and presentation management system for multimedia databases

  20. CONCEPTUAL DATA MODELING OF THE INTEGRATED DATABASE FOR THE RADIOACTIVE WASTE MANAGEMENT

    SciTech Connect (OSTI)

    Park, H.S; Shon, J.S; Kim, K.J; Park, J.H; Hong, K.P; Park, S.H

    2003-02-27T23:59:59.000Z

    A study of a database system that can manage radioactive waste collectively on a network has been carried out. A conceptual data modeling that is based on the theory of information engineering (IE), which is the first step of the whole database development, has been studied to manage effectively information and data related to radioactive waste. In order to establish the scope of the database, user requirements and system configuration for radioactive waste management were analyzed. The major information extracted from user requirements are solid waste, liquid waste, gaseous waste, and waste related to spent fuel. The radioactive waste management system is planning to share information with associated companies.

  1. Management Of Schema Evolution In Databases JosC Andany Michel LConard Carole Palisser

    E-Print Network [OSTI]

    Madiraju, Praveen

    Management Of Schema Evolution In Databases JosC Andany Michel LConard Carole Palisser CUI CUI LIST. Introduction. In the database life cycle, the schema evolution problem first comes up during the design phase. However, its evolutive aspect is not specific to this phase.During the post-designphase,a schemacan

  2. Evaluating the Effectiveness of Fault Tolerance in Replicated Database Management Systems

    E-Print Network [OSTI]

    -Olaf.Hvasshovd@idi.ntnu.no Abstract Database management systems (DBMS) achieve high availabilityand faulttolerance usuallyby of this study is two-fold. It eval- uates the effectiveness of DBMS fault tolerance in the pres- ence on database integrity, performance, and availability on a replicated DBMS, ClustRa[6], in the presence

  3. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  4. Moving Objects Information Management: The Database (Vision Paper)

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e. the management of transient location information, is an enabling technology for all these applications. Location management is also a fundamental component

  5. Message Authentication message authentication is concerned with

    E-Print Network [OSTI]

    Message Authentication · message authentication is concerned with: ­protecting the integrity of a message ­validating identity of originator ­non-repudiation of origin (dispute resolution) · will consider the security requirements · then three alternative functions used: ­message encryption ­message authentication

  6. Databases

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDanielDTN Data

  7. Generic Natural Systems Evaluation - Thermodynamic Database Development and Data Management

    SciTech Connect (OSTI)

    Wolery, T W; Sutton, M

    2011-09-19T23:59:59.000Z

    Thermodynamic data are essential for understanding and evaluating geochemical processes, as by speciation-solubility calculations, reaction-path modeling, or reactive transport simulation. These data are required to evaluate both equilibrium states and the kinetic approach to such states (via the affinity term or its equivalent in commonly used rate laws). These types of calculations and the data needed to carry them out are a central feature of geochemistry in many applications, including water-rock interactions in natural systems at low and high temperatures. Such calculations are also made in engineering studies, for example studies of interactions involving man-made materials such as metal alloys and concrete. They are used in a fairly broad spectrum of repository studies where interactions take place among water, rock, and man-made materials (e.g., usage on YMP and WIPP). Waste form degradation, engineered barrier system performance, and near-field and far-field transport typically incorporate some level of thermodynamic modeling, requiring the relevant supporting data. Typical applications of thermodynamic modeling involve calculations of aqueous speciation (which is of great importance in the case of most radionuclides), solubilities of minerals and related solids, solubilities of gases, and stability relations among the various possible phases that might be present in a chemical system at a given temperature and pressure. If a phase can have a variable chemical composition, then a common calculational task is to determine that composition. Thermodynamic modeling also encompasses ion exchange and surface complexation processes. Any and all of these processes may be important in a geochemical process or reactive transport calculation. Such calculations are generally carried out using computer codes. For geochemical modeling calculations, codes such as EQ3/6 and PHREEQC, are commonly used. These codes typically provide 'full service' geochemistry, meaning that they use a large body of thermodynamic data, generally from a supporting database file, to sort out the various important reactions from a wide spectrum of possibilities, given specified inputs. Usually codes of this kind are used to construct models of initial aqueous solutions that represent initial conditions for some process, although sometimes these calculations also represent a desired end point. Such a calculation might be used to determine the major chemical species of a dissolved component, the solubility of a mineral or mineral-like solid, or to quantify deviation from equilibrium in the form of saturation indices. Reactive transport codes such as TOUGHREACT and NUFT generally require the user to determine which chemical species and reactions are important, and to provide the requisite set of information including thermodynamic data in an input file. Usually this information is abstracted from the output of a geochemical modeling code and its supporting thermodynamic data file. The Yucca Mountain Project (YMP) developed two qualified thermodynamic databases to model geochemical processes, including ones involving repository components such as spent fuel. The first of the two (BSC, 2007a) was for systems containing dilute aqueous solutions only, the other (BSC, 2007b) for systems involving concentrated aqueous solutions and incorporating a model for such based on Pitzer's (1991) equations. A 25 C-only database with similarities to the latter was also developed for the Waste Isolation Pilot Plant (WIPP, cf. Xiong, 2005). The NAGRA/PSI database (Hummel et al., 2002) was developed to support repository studies in Europe. The YMP databases are often used in non-repository studies, including studies of geothermal systems (e.g., Wolery and Carroll, 2010) and CO2 sequestration (e.g., Aines et al., 2011).

  8. Biometric Authentication using Nonparametric Methods

    E-Print Network [OSTI]

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01T23:59:59.000Z

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  9. Evaluation of spatial database management systems: A performance-based comparison 

    E-Print Network [OSTI]

    Arbesser-Rastburg, Thomas

    2009-11-26T23:59:59.000Z

    This analytical research paper investigates the question which of three Spatial Database Management Systems (Oracle 11g, PostgreSQL 8.3 with PostGIS 1.2 and MySQL 5) installed on a Linux platform performs best in queries ...

  10. Fine-grained Updates in Database Management Systems for Flash Zhen He and Prakash Veeraraghavan

    E-Print Network [OSTI]

    He, Zhen

    that it is smaller, lighter, noiseless, more energy efficient and has much greater shock resistance. For small Veeraraghavan Department of Computer Science and Computer Engineering La Trobe University VIC 3086 Australia {z it attractive to build database management systems (DBMSs) on top of flash memory. However, most existing DBMSs

  11. A Temporal Approach to Managing Schema Evolution in Object Database Systems

    E-Print Network [OSTI]

    Szafron, Duane

    A Temporal Approach to Managing Schema Evolution in Object Database Systems Iqbal A. Goralwalla,duane,ozsug@cs.ualberta.ca randal@cs.umanitoba.ca Abstract The issues of schema evolution and temporal object models are generally of a temporal object model. The result is a uniform treatment of schema evolution and temporal support for many

  12. Managing Contention and Timing Constraints in a RealTime Database System \\Lambda

    E-Print Network [OSTI]

    Son, Sang H.

    22903, USA Abstract Previous work in real­time database management systems (RT­DBMS) has primarily based an actual RT­ DBMS on a real­time microkernel operating system. A real RT­DBMS must confront many practical of con­ structing a RT­DBMS is divided into three basic prob­ lems: dealing with resource contention

  13. System Support for Software Fault Tolerance in Highly Available Database Management Systems

    E-Print Network [OSTI]

    California at Irvine, University of

    of several techniques for early error detection and fast recovery in a database management system (DBMS system and the IMS DBMS and DB2 DBMS. The study classifies errors by the type of coding mistake system allow the DBMS to guard (write-protect) #12;2 some of its internal data structures. Guarding DBMS

  14. A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks **

    E-Print Network [OSTI]

    Gruenwald, Le

    1 A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le@ou.edu; smbanik@ou.edu) ** This work is partially supported by the National Science Foundation grant No. EIA connectivity is required. Techniques that manage database transactions in MANET need to address additional

  15. Comprehensive online Atomic Database Management System (DBMS) with Highly Qualified Computing Capabilities

    E-Print Network [OSTI]

    Tahat, Amani

    2011-01-01T23:59:59.000Z

    The intensive need of atomic data is expanding continuously in a wide variety of applications (e.g. fusion energy and astrophysics, laser-produced, plasma researches, and plasma processing).This paper will introduce our ongoing research work to build a comprehensive, complete, up-to-date, user friendly and online atomic Database Management System (DBMS) namely called AIMS by using SQLite (http://www.sqlite.org/about.html)(8). Programming language tools and techniques will not be covered here. The system allows the generation of various atomic data based on professional online atomic calculators. The ongoing work is a step forward to bring detailed atomic model accessible to a wide community of laboratory and astrophysical plasma diagnostics. AIMS is a professional worldwide tool for supporting several educational purposes and can be considered as a complementary database of IAEA atomic databases. Moreover, it will be an exceptional strategy of incorporating the output data of several atomic codes to external ...

  16. Soft Biometrics Database: A Benchmark For Keystroke Dynamics Biometric Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Soft Biometrics Database: A Benchmark For Keystroke Dynamics Biometric Systems Syed Zulkarnain Syed authentication resulting in a more se- cure verification system. Soft biometrics allows a refinement the existing biometric modalities, authentication systems based on keystroke dynamics are particularly

  17. authentication system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 58 Integrating identity-based cryptography in IMS...

  18. DISTRIBUTED DATABASES INTRODUCTION

    E-Print Network [OSTI]

    Liu, Chengfei

    D DISTRIBUTED DATABASES INTRODUCTION The development of network and data communication tech- nology distributed database management. Naturally, the decen- tralized approach reflects the distributed aspects in the definition of a distributed database exist. First, a distributed database is distributed

  19. Graph Databases for Large-Scale Healthcare Systems: A Framework for Efficient Data Management and Data Services

    SciTech Connect (OSTI)

    Park, Yubin [University of Texas at Austin] [University of Texas at Austin; Shankar, Mallikarjun [ORNL] [ORNL; Park, Byung H [ORNL] [ORNL; Ghosh, Dr. Joydeep [University of Texas at Austin] [University of Texas at Austin

    2014-01-01T23:59:59.000Z

    Designing a database system for both efficient data management and data services has been one of the enduring challenges in the healthcare domain. In many healthcare systems, data services and data management are often viewed as two orthogonal tasks; data services refer to retrieval and analytic queries such as search, joins, statistical data extraction, and simple data mining algorithms, while data management refers to building error-tolerant and non-redundant database systems. The gap between service and management has resulted in rigid database systems and schemas that do not support effective analytics. We compose a rich graph structure from an abstracted healthcare RDBMS to illustrate how we can fill this gap in practice. We show how a healthcare graph can be automatically constructed from a normalized relational database using the proposed 3NF Equivalent Graph (3EG) transformation.We discuss a set of real world graph queries such as finding self-referrals, shared providers, and collaborative filtering, and evaluate their performance over a relational database and its 3EG-transformed graph. Experimental results show that the graph representation serves as multiple de-normalized tables, thus reducing complexity in a database and enhancing data accessibility of users. Based on this finding, we propose an ensemble framework of databases for healthcare applications.

  20. Object-Oriented Database for Managing Building Modeling Components and Metadata: Preprint

    SciTech Connect (OSTI)

    Long, N.; Fleming, K.; Brackney, L.

    2011-12-01T23:59:59.000Z

    Building simulation enables users to explore and evaluate multiple building designs. When tools for optimization, parametrics, and uncertainty analysis are combined with analysis engines, the sheer number of discrete simulation datasets makes it difficult to keep track of the inputs. The integrity of the input data is critical to designers, engineers, and researchers for code compliance, validation, and building commissioning long after the simulations are finished. This paper discusses an application that stores inputs needed for building energy modeling in a searchable, indexable, flexible, and scalable database to help address the problem of managing simulation input data.

  1. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOE Patents [OSTI]

    Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

    2000-01-01T23:59:59.000Z

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  2. Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik Chuo N. Lau Matilde Montealegre

    E-Print Network [OSTI]

    Gruenwald, Le

    Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik, transaction management, ad-hoc networks. 1. INTRODUCTION Rapid developments in wireless technology have enabled mobile users to access data from different sites. The Mobile MultiDatabase Management Systems

  3. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  4. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01T23:59:59.000Z

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  5. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

    1996-03-01T23:59:59.000Z

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  6. MINOR PROJECTS STATUS REPORT FAU Minor Projects Management Database Sorted By P-NUMBER Florida Atlantic University -Facilities Planning

    E-Print Network [OSTI]

    Fernandez, Eduardo

    -9-2103) Replace generator fuel tank. PendingP- Required Yes Yes 80,000 6125 MC-12 S Baruch Eliah Watlington ScottMINOR PROJECTS STATUS REPORT FAU Minor Projects Management Database Sorted By P- NUMBER Florida,000 5858 MC-05 S Baruch Eliah Watlington Scott Baruch Pending TBD TBDTBD Morganti Quote received. Project

  7. MINOR PROJECTS STATUS REPORT FAU Minor Projects Management Database Sorted By P-NUMBER Florida Atlantic University -Facilities Planning

    E-Print Network [OSTI]

    Fernandez, Eduardo

    . 305, BOT Board Room NoP- Required Yes Yes 600,000 6196 JUPTR S Baruch Eliah Watlington Scott BaruchMINOR PROJECTS STATUS REPORT FAU Minor Projects Management Database Sorted By P- NUMBER Florida review of wooden loft NAP- N/A No No 400 5407 CO-69 B Thompson" Russell Sawyer B.Thompson NA 6/17/13 3

  8. Karlsruhe Database for Radioactive Wastes (KADABRA) - Accounting and Management System for Radioactive Waste Treatment - 12275

    SciTech Connect (OSTI)

    Himmerkus, Felix; Rittmeyer, Cornelia [WAK Rueckbau- und Entsorgungs- GmbH, 76339 Eggenstein-Leopoldshafen (Germany)

    2012-07-01T23:59:59.000Z

    The data management system KADABRA was designed according to the purposes of the Cen-tral Decontamination Department (HDB) of the Wiederaufarbeitungsanlage Karlsruhe Rueckbau- und Entsorgungs-GmbH (WAK GmbH), which is specialized in the treatment and conditioning of radioactive waste. The layout considers the major treatment processes of the HDB as well as regulatory and legal requirements. KADABRA is designed as an SAG ADABAS application on IBM system Z mainframe. The main function of the system is the data management of all processes related to treatment, transfer and storage of radioactive material within HDB. KADABRA records the relevant data concerning radioactive residues, interim products and waste products as well as the production parameters relevant for final disposal. Analytical data from the laboratory and non destructive assay systems, that describe the chemical and radiological properties of residues, production batches, interim products as well as final waste products, can be linked to the respective dataset for documentation and declaration. The system enables the operator to trace the radioactive material through processing and storage. Information on the actual sta-tus of the material as well as radiological data and storage position can be gained immediately on request. A variety of programs accessed to the database allow the generation of individual reports on periodic or special request. KADABRA offers a high security standard and is constantly adapted to the recent requirements of the organization. (authors)

  9. An Approach to Change Management of Evolving Database Schemas Mark Grechanika, Dewayne Perryb, and Don Batorya

    E-Print Network [OSTI]

    Perry, Dewayne E.

    queries to relational databases using such standards as Universal Data Access (UDA) and Open Database. Almost every database system currently offers some kind of embedded SQL API. The generic API consists and source language types are different the conversion is required between the types. Certain API calls

  10. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  11. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  12. Protocols and security proofs for data authentication

    E-Print Network [OSTI]

    Mityagin, Anton

    2006-01-01T23:59:59.000Z

    Generalized Carter-Wegman MACs . . . . . . . . . . . . . . .which constitute Carter-Wegman message authentication schemening generalized Carter-Wegman message authentication scheme

  13. REGULAR ENTRY IN ENCYCLOPEDIA OF DATABASE SYSTEMS

    E-Print Network [OSTI]

    Risch, Tore

    ://refworks.springer.com/database-systems/ DISTRIBUTED ARCHITECTURE Tore Risch, Uppsala University, Sweden, http://user.it.uu.se/~torer/ SYNONYMS Parallel database, federated database, multi-database, peer-to-peer database DEFINITION A distributed database is a database where data management is distributed over several nodes (computers) in a computer

  14. Tools for Authentication

    SciTech Connect (OSTI)

    White, G

    2008-07-09T23:59:59.000Z

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  15. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  16. COMPILATION AND MANAGEMENT OF ORP GLASS FORMULATION DATABASE, VSL-12R2470-1 REV 0

    SciTech Connect (OSTI)

    Kruger, Albert A. [Department of Energy, Office of River Protection, Richland, Washington (United States); Pasieka, Holly K. [The Catholic University of America, Washington, DC (United States); Muller, Isabelle [The Catholic University of America, Washington, DC (United States); Gilbo, Konstantin [The Catholic University of America, Washington, DC (United States); Perez-Cardenas, Fernando [The Catholic University of America, Washington, DC (United States); Joseph, Innocent [The Catholic University of America, Washington, DC (United States); Pegg, Ian L. [The Catholic University of America, Washington, DC (United States); Kot, Wing K. [The Catholic University of America, Washington, DC (United States)

    2012-12-13T23:59:59.000Z

    The present report describes the first steps in the development of a glass property-composition database for WTP LAW and HL W glasses that includes all of the data that were used in the development of the WTP baseline models and all of the data collected subsequently as part of WTP enhancement studies perfonned for ORP. The data were reviewed to identifY some of the more significant gaps in the composition space that will need to be filled to support waste processing at Hanford. The WTP baseline models have been evaluated against the new data in terms of range of validity and prediction perfonnance.

  17. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-Print Network [OSTI]

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  18. AN OBJECT-ORIENTED SGML/HYTIME COMPLIANT MULTIMEDIA DATABASE MANAGEMENT SYSTEM*

    E-Print Network [OSTI]

    Szafron, Duane

    management system (DBMS) technology. Mostly they have used DBMSs to store meta-information and have stored of a large amount of data. The development of multimedia computing systems can benefit from traditional DBMS-information in some DBMS. Finally, the size and complexity of multimedia objects require special treatment in storage

  19. Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database

    SciTech Connect (OSTI)

    Loper, Susan A.; Sandusky, William F.

    2010-12-31T23:59:59.000Z

    Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

  20. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19T23:59:59.000Z

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  1. A Hybrid Authentication and Authorization Process for Control System Networks

    SciTech Connect (OSTI)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25T23:59:59.000Z

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybrid authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.

  2. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  3. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  4. Quantum direct communication with authentication

    SciTech Connect (OSTI)

    Lee, Hwayean [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Institut fuer Experimentalphysik, Universitaet Wien (Austria); Lim, Jongin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Yang, HyungJin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Department of Physics, Korea University, Chochiwon, Choongnam (Korea, Republic of)

    2006-04-15T23:59:59.000Z

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  5. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Concepts - 5th Edition, May 23, 2005 Database Management System (DBMS) DBMS contains information about

  6. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  7. IT Licentiate theses Query Authentication and

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

  8. Distributed DatabasesDistributed Databases Based on material provided by:Based on material provided by

    E-Print Network [OSTI]

    /References ?? A Database Management SystemA Database Management System (DBMS) is a software package designed(DBMS Databases, 2001 5 Why Use a DBMS?Why Use a DBMS? ?? Data IndependenceData Independence ?? Efficient Access data #12;J.J.Bunn, Distributed Databases, 2001 9 Concurrency ControlConcurrency Control ?? Good DBMS

  9. U-168: EMC Documentum Information Rights Management Server Bugs...

    Broader source: Energy.gov (indexed) [DOE]

    8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

  10. automated database mediation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of database approach + Database Management System (DBMS) + Advantages of Using DBMS + Workers Adam, Salah 239 Mediated Homogenization Quantum Physics (arXiv) Summary:...

  11. SU-E-J-129: A Strategy to Consolidate the Image Database of a VERO Unit Into a Radiotherapy Management System

    SciTech Connect (OSTI)

    Yan, Y; Medin, P; Yordy, J; Zhao, B; Jiang, S [UT Southwestern Medical Center, Dallas, TX (United States)

    2014-06-01T23:59:59.000Z

    Purpose: To present a strategy to integrate the imaging database of a VERO unit with a treatment management system (TMS) to improve clinical workflow and consolidate image data to facilitate clinical quality control and documentation. Methods: A VERO unit is equipped with both kV and MV imaging capabilities for IGRT treatments. It has its own imaging database behind a firewall. It has been a challenge to transfer images on this unit to a TMS in a radiation therapy clinic so that registered images can be reviewed remotely with an approval or rejection record. In this study, a software system, iPump-VERO, was developed to connect VERO and a TMS in our clinic. The patient database folder on the VERO unit was mapped to a read-only folder on a file server outside VERO firewall. The application runs on a regular computer with the read access to the patient database folder. It finds the latest registered images and fuses them in one of six predefined patterns before sends them via DICOM connection to the TMS. The residual image registration errors will be overlaid on the fused image to facilitate image review. Results: The fused images of either registered kV planar images or CBCT images are fully DICOM compatible. A sentinel module is built to sense new registered images with negligible computing resources from the VERO ExacTrac imaging computer. It takes a few seconds to fuse registered images and send them to the TMS. The whole process is automated without any human intervention. Conclusion: Transferring images in DICOM connection is the easiest way to consolidate images of various sources in your TMS. Technically the attending does not have to go to the VERO treatment console to review image registration prior delivery. It is a useful tool for a busy clinic with a VERO unit.

  12. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    Bernstein, Daniel

    encryption. Keywords: Message authentication, PRFs, Carter-Wegman, symmetric encryption, authenticated-cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter-Wegman (CW) ma-schemes [25, 21, 23, 16, 8, 9

  13. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    encryption. Keywords: Message authentication, PRFs, Carter­Wegman, symmetric encryption, authenticated­cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter­Wegman (CW) ma­schemes [25, 21, 23, 16, 8, 9

  14. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22T23:59:59.000Z

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  15. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  16. Artemis Chado database -practical guide Annotation in the database version of Artemis

    E-Print Network [OSTI]

    Maizels, Rick

    -1- Artemis Chado database - practical guide Annotation in the database version of Artemis 1 directory for the backup files and optionally save this setting between sessions. Wait for the `Database and File Manager' to be loaded. Click on `Launch Artemis'. #12;-2- Artemis Chado database - practical guide

  17. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, authentication, MAC, Wegman-Carter, provable security 1 Introduction This paper proves

  18. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators Daniel J. Bernstein Department probabilities for f. Keywords: mode of operation, authentication, MAC, Wegman-Carter, provable security 1

  19. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  20. DRAFT Chapter 1 Introduction to spatial databases

    E-Print Network [OSTI]

    Shekhar, Shashi

    . Today, data is housed in and managed via a database management system (DBMS). Databases and the software which manages them (DBMS) are the silent success story of the information age. They have slowly role of a DBMS has been that of a simple but e#11;ective warehouse of business and accounting data

  1. Database, Spatial Spatial databases are the foundation for computer-based applications involving spatially

    E-Print Network [OSTI]

    managed using a particular type of software called a database management system (DBMS) that allows, leading to spatio-temporal databases when geometric evolutions are supported. Spatial databases can be implemented in a GIS, in a computer-assisted design (CAD) system coupled with a DBMS, in a universal server

  2. Remote Access to Large Spatial Databases Egemen Tanin

    E-Print Network [OSTI]

    Samet, Hanan

    --Spatial databases and GIS This work was supported in part by the National Sci- ence Foundation under Grants EIA-99Remote Access to Large Spatial Databases Egemen Tanin Frantisek Brabec Hanan Samet Computer--Client/server, Distributed applications, Distributed databases; H.2.8 [Database Management]: Database Applications

  3. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  4. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01T23:59:59.000Z

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  5. Data Quality of Native XML Databases in the Healthcare Domain

    E-Print Network [OSTI]

    North, Siobhán

    .0 [Database Management]: Security, integrity and protection; K.6.4 [System Management]: Quality assurance; J.3 are not foolproof. This report reviews work on data quality in both database and management research areas support database systems provide in giving a measure of the quality of the data they hold. This inducts

  6. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

  7. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  8. T-693: Symantec Endpoint Protection Manager Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the Symantec Endpoint Protection Manager software, access data recently submitted by...

  9. Improving Classical Authentication with Quantum Communication

    E-Print Network [OSTI]

    of short secret keys [1]. Brassard's scheme is itself an improvement of the Wegman-Carter protocol [2 of messages we want to authenticate, as opposed to the Wegman-Carter proposal. The security of PRGs is based

  10. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  11. Task 1.13 - Data Collection and Database Development for Clean Coal Technology By-Product Characteristics and Management Practices

    SciTech Connect (OSTI)

    Debra F. Pflughoeft-Hassett

    1998-02-01T23:59:59.000Z

    U.S. Department of Energy Federal Energy Technology Center-Morgantown (DOE FETC) efforts in the areas of fossil fuels and clean coal technology (CCT) have included involvement with both conventional and advanced process coal conversion by-products. In 1993, DOE submitted a Report to Congress on "Barriers to the Increased Utilization of Coal Combustion Desulfurization Byproducts by Governmental and Commercial Sectors" that provided an outline of activities to remove the barriers identified in the report. DOE charged itself with participation in this process, and the work proposed in this document facilitates DOE's response to its own recommendations for action. The work reflects DOE's commitment to the coal combustion by-product (CCB) industry, to the advancement of clean coal technology, and to cooperation with other government agencies. Information from DOE projects and commercial endeavors in fluidized-bed combustion (FBC) and coal gasification is the focus of this task. The primary goal is to provide an easily accessible compilation of characterization information on the by-products from these processes to government agencies and industry to facilitate sound regulatory and management decisions. Additional written documentation will facilitate the preparation of an updated final version of background information collected for DOE in preparation of the Report to Congress on barriers to CCB utilization.

  12. Introduction to Database Database Systems Lecture 1

    E-Print Network [OSTI]

    Alechina, Natasha

    Introduction to Database Systems Database Systems Lecture 1 Natasha Alechina www.cs.nott.ac.uk/~nza/G51DBS #12;In this Lecture · Course Information · Databases and Database Systems · Some History questions · Format similar to previous years. #12;Textbook · Recommended textbooks: · `Database Systems

  13. Science Gateway Databases

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Databases Science Database Services NERSC supports the provisioning of databases to hold large scientific datasets, as part of the science gateways effort. Data-centric...

  14. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02T23:59:59.000Z

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  15. The CEBAF Element Database

    SciTech Connect (OSTI)

    Theodore Larrieu, Christopher Slominski, Michele Joyce

    2011-03-01T23:59:59.000Z

    With the inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting control computers to building controls screens. A requirement influencing the CED design is that it provide access to not only present, but also future and past configurations of the accelerator. To accomplish this, an introspective database schema was designed that allows new elements, types, and properties to be defined on-the-fly with no changes to table structure. Used in conjunction with Oracle Workspace Manager, it allows users to query data from any time in the database history with the same tools used to query the present configuration. Users can also check-out workspaces to use as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented Application Programming Interface (API) that is translated automatically from original C++ source code into native libraries for scripting languages such as perl, php, and TCL making access to the CED easy and ubiquitous.

  16. December 6, 1995 A MODEL FOR MATERIALS DATABASES

    E-Print Network [OSTI]

    Wiederhold, Gio

    believe are the most closely related to future development of materials database management. Broadly advanced materials are unsuitable. 5. Interfaces provided by existing database management systemsDecember 6, 1995 A MODEL FOR MATERIALS DATABASES Gio Wiederhold Laie Caindec John McCarthy Ken

  17. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  18. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  19. March 23, 2008 Databases: Information Systems 1 Information Systems

    E-Print Network [OSTI]

    Adam, Salah

    March 23, 2008 Databases: Information Systems 1 Information Systems #12;March 23, 2008 Databases: Information Systems 2 Objectives What is an Information System (IS) + Classification of Information Systems + Evolution of Information Systems + Information System Management + Performance Requirements of ISs + #12

  20. Nuclear Concrete Materials Database Phase I Development

    SciTech Connect (OSTI)

    Ren, Weiju [ORNL; Naus, Dan J [ORNL

    2012-05-01T23:59:59.000Z

    The FY 2011 accomplishments in Phase I development of the Nuclear Concrete Materials Database to support the Light Water Reactor Sustainability Program are summarized. The database has been developed using the ORNL materials database infrastructure established for the Gen IV Materials Handbook to achieve cost reduction and development efficiency. In this Phase I development, the database has been successfully designed and constructed to manage documents in the Portable Document Format generated from the Structural Materials Handbook that contains nuclear concrete materials data and related information. The completion of the Phase I database has established a solid foundation for Phase II development, in which a digital database will be designed and constructed to manage nuclear concrete materials data in various digitized formats to facilitate electronic and mathematical processing for analysis, modeling, and design applications.

  1. Graphical visualization of implemented storage databases

    SciTech Connect (OSTI)

    Fischer, C.; Hamp, H.P. [Admintec GmbH, Pforzheim (Germany)

    1993-12-31T23:59:59.000Z

    The PC-program LANUC, developed from Admintec, supports a decentralized or centralized storage management of radioactive waste. It gives the storekeeper a graphical view of a storage area and its contents which are otherwise only represented in lists and databases. The storekeeper can plan any movements within the storage area and once they are confirmed, the data in the database are automatically altered. Any implemented database can be represented by simulating a human operator with a program.

  2. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote...

  3. Using Rose and Compass for Authentication

    SciTech Connect (OSTI)

    White, G

    2009-07-09T23:59:59.000Z

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  4. A Database for Leginon: An Interactive User Interface for

    E-Print Network [OSTI]

    dose focus position. Power spectra are also calculated for each of the high magnification images as well as for the focus images. For managing these images we are using a relational database management OBJECTIVE · Management of Leginon's images with a database, · Access to the DB with a WEB Client, · Data

  5. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Edith C. H. Ngai and Michael R. Lyu

    E-Print Network [OSTI]

    Lyu, Michael R.

    distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai

  6. Th D t b E i t dThe Database Environment and Developmentp

    E-Print Network [OSTI]

    Basic Definitions · Database (DB): collection of dataDatabase (DB): collection of data. · DBMS: generic program Management System (DBMS) 1212 #12;Database Management Systemg y Application A software system that is used to create, maintain, and provide controlled access to user databases Application #1 (Order Filing) DBMS

  7. NUCLEAR STRUCTURE DATABASE

    E-Print Network [OSTI]

    Firestone, R.B.

    2010-01-01T23:59:59.000Z

    CALIFORNIA NUCLEAR STRUCTURE DATABASE R. B. Firestone and E.11089 NUCLEAR STRUCTURE DATABASE by R.B. Firestone and E.iii- NUCLEAR STRUCTURE DATABASE R.B Firestone and E. Browne

  8. Environmental release summary (ERS) database CY 1997

    SciTech Connect (OSTI)

    Gleckler, B.P.

    1998-07-01T23:59:59.000Z

    This report discusses the Environmental Release Summary (ERS) database. The current needs of the Effluent and Environmental database is continually modified to fulfill monitoring (EEM) program (managed by Waste Management Federal Services of Hanford, Incorporated, Air and Water Services Organization). Changes are made to accurately calculate current releases, to affect how past releases are calculated. This document serves as a snap-shot of the database and software for the CY-1997 data and releases. This document contains all of the relevant data for calculating radioactive-airborne and liquid effluent. The ERS database is the official repository for the CY-1997 ERS release reports and the settings used to generate those reports. As part of the Tri-Party Agreement, FDH is committed to provide a hard copy of the ERS database for Washington State Department of Ecology, upon request. This document also serves as that hard copy for the last complete calendar year.

  9. Education Library EndNote EndNote is a bibliographic management software package. It is designed to save your references in a searchable database, place those

    E-Print Network [OSTI]

    Saskatchewan, University of

    . It is designed to save your references in a searchable database, place those references into Word or Word Catalogue search in the standard fashion. mark the records you wish to save. select select select End-Note as format, and Local Disk as destination. select from the dialogue box options select choose your 'Save in

  10. VideoSTAR (Video STorage And Retrieval) is an experimental database frame-work for video information management. The development of this framework

    E-Print Network [OSTI]

    ABSTRACT VideoSTAR (Video STorage And Retrieval) is an experimental database frame- work for video of traditional video tape archives are facing and by the multimedia technology that makes integrated, digital video archives feasible. Speci cally, VideoSTAR addresses issues related to sharing of video information

  11. Comment on 'Quantum direct communication with authentication'

    SciTech Connect (OSTI)

    Zhang, Zhan-jun [Department of Physics and Center for Quantum Information Science, National Cheng Kung University, Tainan 70101, Taiwan (China); Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China); Liu, Jun; Wang, Dong; Shi, Shou-hua [Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China)

    2007-02-15T23:59:59.000Z

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.

  12. Biodiversity Database Developer/Programmer Academy of Natural Sciences, Philadelphia

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Biodiversity Database Developer/Programmer Academy of Natural Sciences, Philadelphia (Position of Philadelphia seeks a database programmer who can develop desktop and web-based solutions for managing specimen), paleontology (fossils) and general invertebrates. Current databases hold more than 1 million records in various

  13. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01T23:59:59.000Z

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  14. Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival

    E-Print Network [OSTI]

    Kim, Hyounggon

    2005-02-17T23:59:59.000Z

    the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

  15. authentic cost calculations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ;Abstract iii We also show how to use two existing multicast authentication techniques (TESLA and a master for embedded control networks characterized by few re- ceivers and weak...

  16. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Broader source: Energy.gov (indexed) [DOE]

    Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard...

  17. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, MAC, Wegman-Carter, provable security 1 Introduction This paper proves that various

  18. Shouhuai Xu 2000 1 Password-based Authentication and

    E-Print Network [OSTI]

    Sandhu, Ravi

    &AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

  19. A Flexible Approach to Embedded Network Multicast Authentication

    E-Print Network [OSTI]

    Koopman, Philip

    A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

  20. A Common Database Interface (DBI) R-Databases Special Interest Group

    E-Print Network [OSTI]

    Bain, Mike

    ) and database management systems (DBMS). The interface defines a small set of classes and methods similar;2 Introduction The database interface (DBI) separates the connectivity to the DBMS into a "front-end" and a "back-end". Applications use only the exposed "front-end" API. The facilities that communicate with specific DBMS (Oracle

  1. IEEE TRANS. INFORM. THEORY, VOL. X, NO. XX, 2005 1 Authentication with Distortion Criteria

    E-Print Network [OSTI]

    Martinian, Emin

    authentication system constructions. Index Terms-- multimedia security, authentication, digi- tal signatures of possible perturbations, including, for example, degradation due to noise or compression; transformation

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  3. Development of specialized electronic bibliographic databases for deep ocean hydrocarbon production and transportation

    E-Print Network [OSTI]

    Mahendran, Joseph Anthony

    1992-01-01T23:59:59.000Z

    , relational databases and the mathematical concept underlying the relational model, and the development of the relational database system, DOHPT. Database Management System A Database management system (DBMS) is a collection of interrelated data files...; and (iv) provides the users with higher level view of the data. The primary purpose of the DBMS is to provide an environment that is both convenient and efficient to use, to retrieve information from the database, and to store information...

  4. Lessons Learned From Developing Reactor Pressure Vessel Steel Embrittlement Database

    SciTech Connect (OSTI)

    Wang, Jy-An John [ORNL

    2010-08-01T23:59:59.000Z

    Materials behaviors caused by neutron irradiation under fission and/or fusion environments can be little understood without practical examination. Easily accessible material information system with large material database using effective computers is necessary for design of nuclear materials and analyses or simulations of the phenomena. The developed Embrittlement Data Base (EDB) at ORNL is this comprehensive collection of data. EDB database contains power reactor pressure vessel surveillance data, the material test reactor data, foreign reactor data (through bilateral agreements authorized by NRC), and the fracture toughness data. The lessons learned from building EDB program and the associated database management activity regarding Material Database Design Methodology, Architecture and the Embedded QA Protocol are described in this report. The development of IAEA International Database on Reactor Pressure Vessel Materials (IDRPVM) and the comparison of EDB database and IAEA IDRPVM database are provided in the report. The recommended database QA protocol and database infrastructure are also stated in the report.

  5. DBDOC: Querying and Browsing Databases and Interrelated Documents

    E-Print Network [OSTI]

    Ordonez, Carlos

    ]: Database Administra- tion--Data warehouse and repository General Terms Management, Documentation, Design 1 to describe this structured data. Managing semi- structured sources, such as documents, text files, web pagesDBDOC: Querying and Browsing Databases and Interrelated Documents Carlos Garcia-Alvarado University

  6. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  7. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  8. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26T23:59:59.000Z

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  9. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect (OSTI)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01T23:59:59.000Z

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  10. The EMIME Bilingual Database 

    E-Print Network [OSTI]

    Wester, Mirjam

    2010-01-01T23:59:59.000Z

    This paper describes the collection of a bilingual database of Finnish/English and German/English data. In addition, the accents of the talkers in the database have been rated. English, German and Finnish listeners assessed the English, German...

  11. Hazard Analysis Database report

    SciTech Connect (OSTI)

    Niemi, B.J.

    1997-08-12T23:59:59.000Z

    This document describes and defines the Hazard Analysis Database for the Tank Waste Remediation System Final Safety Analysis Report.

  12. ORACLE CERTIFICATION Oracle Database

    E-Print Network [OSTI]

    Loudon, Catherine

    ORACLE CERTIFICATION Oracle Database Administration Certificate Program Train with the best. Get your Oracle Database Administration education from the number-one provider* of Oracle training-on, lab-based understanding of Oracle, the world's leading database platform, and long the product

  13. Database Encryption Luc Bouganim

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Database Encryption Luc Bouganim INRIA Rocquencourt Le Chesnay, FRANCE Luc.Bouganim@inria.fr Yanli GUO INRIA Rocquencourt Le Chesnay, FRANCE yanli.guo@inria.fr Related concepts and keywords Database security, Data confidentiality, Hardware Security Module Definition Database encryption refers to the use

  14. Bridging the Gap in the Chemical Thermodynamic Database for Nuclear Waste Repository: Studies of the Effect of Temperature on Actinide Complexation

    E-Print Network [OSTI]

    Rao, Linfeng

    2011-01-01T23:59:59.000Z

    Thermodynamic Database for Nuclear Waste Repository: Studiesthermodynamic database for nuclear waste repository wherethe safe management of nuclear wastes is to store the high-

  15. Database Description with SDM: A Semantic Database Model

    E-Print Network [OSTI]

    McLeod, Dennis

    Database Description with SDM: A Semantic Database Model MICHAEL HAMMER Massachusetts Institute of Technology and DENNIS McLEOD University of Southern California SDM is a high-level semantics-based database description and structuring formalism (database model) for databases. This database model is designed

  16. Database tool ASGARD: an open-access database of

    E-Print Network [OSTI]

    Extavour, Cassandra

    Database tool ASGARD: an open-access database of annotated transcriptomes for emerging model database, the Assembled Searchable Giant Arthropod Read Database (ASGARD). This database is a repository include search term auto-completion sug- gestions based on database content, the ability to download

  17. Testing Database-Centric Applications For Causes of Database Deadlocks

    E-Print Network [OSTI]

    Grechanik, Mark

    Testing Database-Centric Applications For Causes of Database Deadlocks Mark Grechanik, B. M. Mainul--Many organizations deploy applications that use databases by sending Structured Query Language (SQL) state- ments the same databases concurrently, database deadlocks routinely occur in these databases. Testing

  18. Risk Management for Distributed Authorization Christian Skalka

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    Risk Management for Distributed Authorization Christian Skalka University of Vermont X. Sean Wang assess risk, but risk in trust management is usually an informal consideration. In this paper, we de trust management systems treat all assertions as equally valid up to certificate authentication

  19. Active Social Media Management: The Case of Health Care

    E-Print Network [OSTI]

    Miller, Amalia R.

    Given the demand for authentic personal interactions over social media, it is unclear how much firms should actively manage their social media presence. We study this question empirically in a health care setting. We show ...

  20. TABLEFS: Embedding a NoSQL Database Inside the Local File System

    E-Print Network [OSTI]

    monolithic database management system (DBMS) bundles [31]. 1 Background Even in the era of big data, most local file systems [34]. Embedded Databases File system metadata is structured data, a natural fit

  1. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of

  2. Stronger security bounds for WegmanCarterShoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman­Carter­Shoup authenticators Daniel J. Bernstein # Department, Wegman­Carter, provable security 1 Introduction This paper proves that various state­of­the­art 128­bit

  3. Authenticated Encryption: How Reordering can Impact Performance Basel Alomair

    E-Print Network [OSTI]

    ciphertext blocks are then authenticated using a MAC based on a universal hash-function family (in the Carter-Wegman encryption [30]. The GCM standard is based on the Carter- Wegman Counter (CWC) blockcipher mode

  4. austrian meat authenticity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is...

  5. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    form fields. A remote or local user can conduct a cross-site scripting or clickjacking attack to access the username and password of an authenticated session. IMPACT: Disclosure of...

  6. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26T23:59:59.000Z

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  7. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  8. Authenticity and Physiological Changes during Defensive Verbal Response

    E-Print Network [OSTI]

    Yen, Yana

    2013-08-31T23:59:59.000Z

    who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. 2010 Worldwide Gasification Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

  11. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  12. accident management program: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data Rose, Michael R. 12 STATE OF CALIFORNIA...

  13. anesthetic management techniques: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    "Ozsu-Valduriez textbook Principles of Distributed Database Systems 10 reflects the evolution of distributed data management and distributed database systems. In this new...

  14. A Database in Every Sensor Nicolas Tsiftes

    E-Print Network [OSTI]

    Dunkels, Adam

    a database management system (DBMS), provid- ing a rich query interface to the flash storage of the node, we present Antelope, a complete DBMS for resource-constrained sen- sor devices, and a new flash indexing method called Max- Heap. Antelope, which to the best of our knowledge is the first DBMS

  15. 1. Integrated Database 2. Boundary Analysis

    E-Print Network [OSTI]

    or gathered in the course of work under National Science Foundation grants Data Management Plans #12;Database" Soum Properties of herd Herding Households Survey Animal measures Grazing territory Pastures Migratory/Economic/ Social (existing national data) Subwatershed Data to be collected Survey Survey #12;GIS as an Integrative

  16. Using metabolic databases for

    E-Print Network [OSTI]

    sequences are searched routinely against databases, and the World Wide Web has made such queries simple and you have little idea what these words even mean. The SWISS-PROT database3, main- tained by Amos especially for the Web and offers the additional ability to focus on the metabolic reactions in specific

  17. Concurrency control in a fully replicated database environment

    E-Print Network [OSTI]

    Nath, Rajivendra

    1992-01-01T23:59:59.000Z

    of the sites has a fully replicated copy of the database managed by a DBMS. The database consists of a number of named data items each having the time-stamp of the last transaction to update it. Att the messages concerned with this algorithm move in one...

  18. Integrated storage and querying of spatially varying data quality information in a relational spatial database

    E-Print Network [OSTI]

    Duckham, Matt

    Variation in Quality Keywords Spatial data quality; spatial database; relational database management system of existing and proposed spatial data quality management systems. 1 INTRODUCTION Uncertainty has long been systems in the literature for spatial data quality management, highlighting three funda- mentally

  19. NIST Standard Reference Database 17 NIST Chemical Kinetics Database

    E-Print Network [OSTI]

    NIST Standard Reference Database 17 __________________________________________________________ NIST Chemical Kinetics Database WindowsTM Version 2Q98 Users' Guide (NIST) uses its best efforts to deliver a high quality copy of the Database and to verify that the data

  20. Hazard Analysis Database Report

    SciTech Connect (OSTI)

    GRAMS, W.H.

    2000-12-28T23:59:59.000Z

    The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for U S . Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for HNF-SD-WM-SAR-067, Tank Farms Final Safety Analysis Report (FSAR). The FSAR is part of the approved Authorization Basis (AB) for the River Protection Project (RPP). This document describes, identifies, and defines the contents and structure of the Tank Farms FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The Hazard Analysis Database supports the preparation of Chapters 3 ,4 , and 5 of the Tank Farms FSAR and the Unreviewed Safety Question (USQ) process and consists of two major, interrelated data sets: (1) Hazard Analysis Database: Data from the results of the hazard evaluations, and (2) Hazard Topography Database: Data from the system familiarization and hazard identification.

  1. The X.509 Privilege Management Infrastructure

    E-Print Network [OSTI]

    Kent, University of

    Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

  2. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  3. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  4. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  5. Sandia National Laboratories: CREW Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CREW Database Sandia Involves Wind-Farm Owners in Defining New Data Pathway for National Wind-Plant Reliability Database On March 19, 2014, in Computational Modeling & Simulation,...

  6. USER'S GUIDE DATABASE SYSTEM

    E-Print Network [OSTI]

    server and runs on the PPPL VAX cluster under VMS. The MINGL database system for TFTR is composed on the VAX. This document describes the overall system in terms of how the various parts interact

  7. Nuclear Science References Database

    E-Print Network [OSTI]

    B. Pritychenko; E. B?ták; B. Singh; J. Totans

    2014-07-08T23:59:59.000Z

    The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

  8. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

    1994-05-27T23:59:59.000Z

    The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  9. Solid Waste Projection Model: Database (Version 1.4). Technical reference manual

    SciTech Connect (OSTI)

    Blackburn, C.; Cillan, T.

    1993-09-01T23:59:59.000Z

    The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.4 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement. Those interested in using the SWPM database should refer to the SWPM Database User`s Guide. This document is available from the PNL Task M Project Manager (D. L. Stiles, 509-372-4358), the PNL Task L Project Manager (L. L. Armacost, 509-372-4304), the WHC Restoration Projects Section Manager (509-372-1443), or the WHC Waste Characterization Manager (509-372-1193).

  10. Databases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsNovember 13, 2014ContributingDOE ContractDepartment of4Databases Databases

  11. The fragility of AES-GCM authentication algorithm Shay Gueron1,2

    E-Print Network [OSTI]

    for the authentication. The GHASH algorithm is a special form of the Carter-Wegman polynomial evaluation MAC. Each 16

  12. Crude Oil Analysis Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Shay, Johanna Y.

    The composition and physical properties of crude oil vary widely from one reservoir to another within an oil field, as well as from one field or region to another. Although all oils consist of hydrocarbons and their derivatives, the proportions of various types of compounds differ greatly. This makes some oils more suitable than others for specific refining processes and uses. To take advantage of this diversity, one needs access to information in a large database of crude oil analyses. The Crude Oil Analysis Database (COADB) currently satisfies this need by offering 9,056 crude oil analyses. Of these, 8,500 are United States domestic oils. The database contains results of analysis of the general properties and chemical composition, as well as the field, formation, and geographic location of the crude oil sample. [Taken from the Introduction to COAMDATA_DESC.pdf, part of the zipped software and database file at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the zipped file to your PC. When opened, it will contain PDF documents and a large Excel spreadsheet. It will also contain the database in Microsoft Access 2002.

  13. The GLIMS Glacier Database: a spatio-temporal database

    E-Print Network [OSTI]

    Raup, Bruce H.

    The GLIMS Glacier Database: a spatio-temporal database implemented using Open Source tools Bruce countries #12;#12;#12;#12;#12;System components PostgreSQL (relational database) PostGIS (geospatial) GDAL (Geospatial Data Abstraction Library) Perl, PHP, Shapelib, ... #12;GLIMS Glacier Database System

  14. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  15. Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P. PARKERSON

    E-Print Network [OSTI]

    Thompson, Dale R.

    Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P.S.A. ABSTRACT Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared

  16. University of Newcastle upon Tyne Evaluation of Authorization-Authentication Tools: PERMIS, OASIS,

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    -Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu and P. Periorellis TECHNICAL REPORT SERIES No. CS-TR-935 of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu, P. Periorellis Abstract GOLD (Grid., PERIORELLIS, P.. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH [By] J. Wu

  17. The order of encryption and authentication for protecting communications (Or: how secure is SSL?)

    E-Print Network [OSTI]

    The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

  18. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    , or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

  19. Chapter 10 Creating and Maintaining Geographic Databases 131 Creating and Maintaining

    E-Print Network [OSTI]

    Wright, Dawn Jeannine

    (DBMS), a specialist piece of software designed to handle multi-user access to an integrated set of data and versioning. 10 #12;Chapter 10 Creating and Maintaining Geographic Databases 132 KEY WORDS AND CONCEPTS DBMS.2 Database management systems 10.3 Storing data in DBMS tables 10.4 SQL 10.5 Geographic database types

  20. Database Security Sabrina De Capitani di Vimercati, Dip. Elettronica, Universit a di Brescia, 25123 Brescia, Italy

    E-Print Network [OSTI]

    Samarati, Pierangela

    data stored in a database is called a database management system DBMS. A database can be seen at di of the underlying operating system see Figure 2. Beside access and processing functionalities, each DBMS must also system, one may think that a DBMS does not need to deal with security as security functionalities

  1. Database Sampling with Functional Dependencies

    E-Print Network [OSTI]

    Riera, Jesús Bisbal

    Database Sampling with Functional Dependencies Jes´us Bisbal, Jane Grimson Department of Computer there is a need to prototype the database which the applications will use when in operation. A prototype database can be built by sampling data from an existing database. Including relevant semantic information when

  2. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Keystroke Biometric Test-Taker Authentication System

    E-Print Network [OSTI]

    Tappert, Charles

    Biometric Test-Taker Authentication System Michael Wuench, Mingfei Bi, Evelin Urbaez, Shaji Mary Varghese

  3. ASRS Database Report Set Fuel Management Issues

    E-Print Network [OSTI]

    be limited. The National Aeronautics and Space Administration and its ASRS current contractor, Booz Allen Hamilton, specifically disclaim any responsibility for any interpretation which may be made by others

  4. National Ambient Radiation Database

    SciTech Connect (OSTI)

    Dziuban, J.; Sears, R.

    2003-02-25T23:59:59.000Z

    The U.S. Environmental Protection Agency (EPA) recently developed a searchable database and website for the Environmental Radiation Ambient Monitoring System (ERAMS) data. This site contains nationwide radiation monitoring data for air particulates, precipitation, drinking water, surface water and pasteurized milk. This site provides location-specific as well as national information on environmental radioactivity across several media. It provides high quality data for assessing public exposure and environmental impacts resulting from nuclear emergencies and provides baseline data during routine conditions. The database and website are accessible at www.epa.gov/enviro/. This site contains (1) a query for the general public which is easy to use--limits the amount of information provided, but includes the ability to graph the data with risk benchmarks and (2) a query for a more technical user which allows access to all of the data in the database, (3) background information on ER AMS.

  5. Databases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube| Department ofDepartment9-92JanuaryProgram Areas »Databases Databases The Fuel

  6. Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS

    E-Print Network [OSTI]

    Maryland at College Park, University of

    ABSTRACT Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS Paul S. Hutchison, Ph.D., 2008 Dissertation Directed By: Professor David Hammer, Departments of Curriculum Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park

  7. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  8. Bucket Hashing and its Application to Fast Message Authentication

    E-Print Network [OSTI]

    Bernstein, Daniel

    the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman to authenticate. But it is well­known that this reasoning is specious: in particular, Wegman and Carter [32. In the Wegman--Carter approach communicating parties S and V share a secret key k = (h; P ) which specifies both

  9. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  10. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  11. Patent-Free Authenticated-Encryption As Fast As OCB

    E-Print Network [OSTI]

    Krovetz, Ted

    . Encryption is achieved via counter-mode while authenti- cation uses the Wegman-Carter paradigm. A single encryption and authentication under a single key. Some of the modes also switch to faster Wegman to nearly x cpb because recent Wegman-Carter schemes are as fast as 0.5 cpb--much faster than any known

  12. Universal hashing and authentication codes 1 D. R. Stinson

    E-Print Network [OSTI]

    Stinson, Douglas

    authentication codes without secrecy. This idea is due to Wegman and Carter [14], who gave a construction which states (plaintext messages). We generalize the Wegman and Carter construction by formally de#12;ning some to decrease the key length by a factor of four (roughly) compared to the Wegman and Carter construction, while

  13. Behavioral Authentication of Server Flows James P. Early

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    Behavioral Authentication of Server Flows James P. Early Carla E. Brodley ˇ Catherine Rosenberg, in the presence of proxy servers that re-map port numbers or host services that have been compromised to act as backdoors or covert channels. We present an approach to classify server traffic based on decision trees

  14. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  15. Authenticated Streamwise On-line Encryption Patrick P. Tsang

    E-Print Network [OSTI]

    and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

  16. SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

  17. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  18. ELmE : A Misuse Resistant Parallel Authenticated Encryption

    E-Print Network [OSTI]

    -Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

  19. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  20. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  1. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  2. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  3. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  4. Exploring Power-Performance Tradeoffs in Database Systems

    E-Print Network [OSTI]

    Tu, Yicheng

    explore the potential of power conservation in relational database management systems. We hypothesize that, power management has become a critical issue in system design and implementation [26]. Various sources the above costs are calculated directly from energy consumption, power (i.e., energy consumption per unit

  5. AN OVERVIEW ON DATABASESAN OVERVIEW ON DATABASES What is a Database?What is a Database?

    E-Print Network [OSTI]

    Schweik, Charles M.

    3/22/2011 1 1 AN OVERVIEW ON DATABASESAN OVERVIEW ON DATABASES C. Schweik 2 What is a Database?What is a Database? A well organized collection of data that are related in a meaningful way. Data can be accessed, structured and shared. #12;3/22/2011 2 3 Data in Database SystemsData in Database Systems should be:should be

  6. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  7. Science & Engineering Engineering Databases

    E-Print Network [OSTI]

    Hampton, Randy

    -present. Good for computers, electronics, biomedical, control, electrical and ocean engineering, physics9/09 DK,DS Science & Engineering Library Engineering Databases How to search the engineering initials Special features: Limit to peer-reviewed journals Compendex [Engineering Index] 1884-present

  8. High Performance Buildings Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The High Performance Buildings Database is a shared resource for the building industry, a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad. The database includes information on the energy use, environmental performance, design process, finances, and other aspects of each project. Members of the design and construction teams are listed, as are sources for additional information. In total, up to twelve screens of detailed information are provided for each project profile. Projects range in size from small single-family homes or tenant fit-outs within buildings to large commercial and institutional buildings and even entire campuses. The database is a data repository as well. A series of Web-based data-entry templates allows anyone to enter information about a building project into the database. Once a project has been submitted, each of the partner organizations can review the entry and choose whether or not to publish that particular project on its own Web site.

  9. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    , video, image, and data, be available anytime and everywhere to everybody. The Federal Communications Commission (FCC), U. S. A., defines personal communications services as "a family of mobile or portable radioC. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain

  10. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  11. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Ĺke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  12. A Case for Database Filesystems

    SciTech Connect (OSTI)

    Adams, P A; Hax, J C

    2009-05-13T23:59:59.000Z

    Data intensive science is offering new challenges and opportunities for Information Technology and traditional relational databases in particular. Database filesystems offer the potential to store Level Zero data and analyze Level 1 and Level 3 data within the same database system [2]. Scientific data is typically composed of both unstructured files and scalar data. Oracle SecureFiles is a new database filesystem feature in Oracle Database 11g that is specifically engineered to deliver high performance and scalability for storing unstructured or file data inside the Oracle database. SecureFiles presents the best of both the filesystem and the database worlds for unstructured content. Data stored inside SecureFiles can be queried or written at performance levels comparable to that of traditional filesystems while retaining the advantages of the Oracle database.

  13. The EMIME Mandarin Bilingual Database 

    E-Print Network [OSTI]

    Wester, Mirjam; Liang, Hui

    2011-01-01T23:59:59.000Z

    This paper describes the collection of a bilingual database of Mandarin/English data. In addition, the accents of the talkers in the database have been rated. English and Mandarin listeners assessed the English and Mandarin talkers' degree...

  14. R&D Accomplishments Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    recent accomplishments, including the latest Nobel Laureates associated with DOE. Database * Selected documents about noted accomplishments * Documents and individual pages...

  15. A+M Collisional Databases in ALADDIN Format

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    ALADDIN (A Labelled Atomic Data Interface) is a database system developed in order to provide a standard and flexible format and interface for the exchange and management of atomic, molecular and plasma-material interaction data of interest to fusion research. As part of the Atomic and Molecular Data Information System (AMDIS), introduced by the IAEA Atomic and Molecular Data Unit, the ALADDIN interface is available on-line. Twelve databases from DOE and IAEA sources are available from the CFADC website under the heading A+M Collisional Databases.

  16. A Noisy 10GB Provenance Database

    E-Print Network [OSTI]

    Cheah, You-Wei

    2013-01-01T23:59:59.000Z

    Workload The provenance database is generated from theperformance of the provenance database generation process tox-axis). Figure 4 shows the database being populated with

  17. Observational Mishaps - a Database

    E-Print Network [OSTI]

    Kaspar von Braun; Kristin Chiboucas; Denise Hurley-Keller

    1999-06-11T23:59:59.000Z

    We present a World-Wide-Web-accessible database of astronomical images which suffer from a variety of observational problems, ranging from common occurences, such as dust grains on filters and/or the dewar window, to more exotic phenomena, such as loss of primary mirror support due to the deflation of the support airbags. Apart from its educational usefulness, the purpose of this database is to assist astronomers in diagnosing and treating errant images at the telescope, thus saving valuable telescope time. Every observational mishap contained in this on-line catalog is presented in the form of a GIF image, a brief explanation of the problem, and, when possible, a suggestion for improving the image quality.

  18. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Calm, J.M.

    1992-11-09T23:59:59.000Z

    The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R- 717 (ammonia), ethers, and others as well as azeotropic and zeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents on compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. A computerized version is available that includes retrieval software.

  19. REALALGEBRAIC GEOMETRY AND CONSTRAINT DATABASES

    E-Print Network [OSTI]

    Antwerpen, Universiteit

    of tuples. Fig. 13.1 shows an instance of a relational database that contains the two relations Beer and Pub. This database contains tourist information about beers and the pubs where they are served. It also contains, the attributes of Beer are Name, Pub, City and Postal code. The complete schema of the relational database of Fig

  20. DATABASE FOR PREMATURE CONCRETE DETERIORATION

    E-Print Network [OSTI]

    Texas at Austin, University of

    0-4085-P3 DATABASE FOR PREMATURE CONCRETE DETERIORATION Author: Kevin J. Folliard Project 0. This product presents the architecture for a database to collect relevant information on materials and mixture in developing and populating various materials- and structures-specific databases for both new concrete

  1. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

    1999-01-01T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilities access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  2. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1996-11-15T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  3. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1996-07-01T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  4. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M. [Calm (James M.), Great Falls, VA (United States)] [Calm (James M.), Great Falls, VA (United States)

    1996-04-15T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates. Citations in this report are divided into the following topics: thermophysical properties; materials compatibility; lubricants and tribology; application data; safety; test and analysis methods; impacts; regulatory actions; substitute refrigerants; identification; absorption and adsorption; research programs; and miscellaneous documents. Information is also presented on ordering instructions for the computerized version.

  5. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Cain, J.M. [Calm (James M.), Great Falls, VA (United States)

    1993-04-30T23:59:59.000Z

    The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents to accelerate availability of the information and will be completed or replaced in future updates.

  6. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

    1998-08-01T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufactures and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on many refrigerants including propane, ammonia, water, carbon dioxide, propylene, ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

  7. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1997-02-01T23:59:59.000Z

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alterative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on various refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

  8. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two...

  9. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two...

  10. Accountable Certificate Management using Undeniable Attestations

    E-Print Network [OSTI]

    ¨uberneetika AS Akadeemia tee 21 12618 Tallinn, Estonia ahto.buldas@cyber.ee Peeter Laud Universit¨at des Saarlandes FB 14 management system. Moreover, authenticated search trees can be used in many security-critical applications for personal or classroom use is granted without fee provided that copies are not made or distributed

  11. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  12. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  13. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  14. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  15. National Residential Efficiency Measures Database Webinar Slides...

    Energy Savers [EERE]

    National Residential Efficiency Measures Database Webinar Slides National Residential Efficiency Measures Database Webinar Slides Presentation slides for the Building Technologies...

  16. A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Database Replication) \\Lambda

    E-Print Network [OSTI]

    PIR Avoiding Database Replication) \\Lambda Yael Gertner y Shafi Goldwasser z Tal Malkin x February 1998 Abstract Private information retrieval (PIR) schemes enable users to obtain information from databases while keeping their queries secret from the database managers. We propose a new model for PIR

  17. ARM Publications Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related Links Facilities andPastWrittenDatabaseSearchTips

  18. Principles of spatial database analysis and design This chapter covers the fundamentals of spatial database analysis and design, It begins by

    E-Print Network [OSTI]

    ) system coupled with a database management system (DBMS), in a spatial engine accessed through an application programming interface (API), and sitting on top of a DBMS, in a universal (object

  19. THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky

    E-Print Network [OSTI]

    Franek, Frantisek

    of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules-based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

  20. THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky

    E-Print Network [OSTI]

    Franek, Frantisek

    of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules­based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

  1. Database Manipulation on Quantum Computers

    E-Print Network [OSTI]

    Ahmed Younes

    2007-05-29T23:59:59.000Z

    Manipulating a database system on a quantum computer is an essential aim to benefit from the promising speed-up of quantum computers over classical computers in areas that take a vast amount of storage and processing time such as in databases. In this paper, the basic operations for manipulating the data in a quantum database will be defined, e.g. INSERT, UPDATE, DELETE, SELECT, backing up and restoring a database file. This gives the ability to perform the data processing that usually takes a long processing time on a classical database system, in a simultaneous way on a quantum computer. Defining a quantum version of more advanced concepts used in database systems, e.g. the referential integrity and the relational algebra, is a normal extension to this work

  2. Biological & Environmental Research Abstracts Database

    Office of Scientific and Technical Information (OSTI)

    Welcome to the Administrative section of the Biological and Environmental Research Abstracts Database. Please logon. Logon Name: Password: Logon CommentsEmail Us * Security...

  3. Energy Citations Database (ECD) - Architecture

    Office of Scientific and Technical Information (OSTI)

    Search Architecture - What Is under the hood? The Energy Citations Database makes searchable over two million bibliographic citations for energy and energy related STI from the...

  4. ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing

    E-Print Network [OSTI]

    such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

  5. Ribosomal Database Project II

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Ribosomal Database Project (RDP) provides ribosome related data and services to the scientific community, including online data analysis and aligned and annotated Bacterial small-subunit 16S rRNA sequences. As of March 2008, RDP Release 10 is available and currently (August 2009) contains 1,074,075 aligned 16S rRNA sequences. Data that can be downloaded include zipped GenBank and FASTA alignment files, a histogram (in Excel) of the number of RDP sequences spanning each base position, data in the Functional Gene Pipeline Repository, and various user submitted data. The RDP-II website also provides numerous analysis tools.[From the RDP-II home page at http://rdp.cme.msu.edu/index.jsp

  6. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Xu, Wenyuan

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  7. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  8. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  9. Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang

    E-Print Network [OSTI]

    Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

  10. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  11. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

  12. SSL/TLS Session-Aware User Authentication Rolf Oppliger1

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

  13. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  14. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  15. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    (International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

  16. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  17. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  18. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

    E-Print Network [OSTI]

    Nřrvĺg, Kjetil

    . The performance cost evaluation of security protocols, such as the Internet key exchange version 2 (IKEv2 and IKEv2 in an OPNET simulation environment. They used pre-shared key (PSK) based authentication methodsA Measurement Study on IKEv2 Authentication Performance in Wireless Networks Zolt´an Faigl , Stefan

  19. Atomic-scale Authentication Using Resonant Tunnelling Diodes

    E-Print Network [OSTI]

    J. Roberts; I. E. Bagci; M. A. M. Zawawi; J. Sexton; N. Hulbert; Y. J. Noori; M. P. Young; C. S. Woodhead; M. Missous; M. A. Migliorato; U. Roedig; R. J. Young

    2015-02-23T23:59:59.000Z

    The rapid development of technology has provided a wealth of resources enabling the trust of everyday interactions to be undermined. Authentication schemes aim to address this challenge by providing proof of identity. This can be achieved by using devices that, when challenged, give unique but reproducible responses. At present, these distinct signatures are commonly generated by physically unclonable functions, or PUFs. These devices provide a straightforward measurement of a physical characteristic of their structure that has inherent randomness, due to imperfections in the manufacturing process. These hard-to-predict physical responses can generate a unique identity that can be used for authentication without relying on the secrecy of stored data. However, the classical design of these devices limits both their size and security. Here we show that the extensively studied problematic fluctuations in the current-voltage measurements of resonant tunnelling diodes (RTDs) provide an uncomplicated, robust measurement that can function as a PUF without conventional resource limitations. This is possible due to quantum tunnelling within the RTD, and on account of these room temperature quantum effects, we term such devices QUFs - quantum unclonable functions. As a result of the current-voltage spectra being dependent on the atomic structure and composition of the nanostructure within the RTD, each device provides a high degree of uniqueness, whilst being impossible to clone or simulate, even with state-of-the-art technology. We have thus created PUF-like devices requiring the fewest resources which make use of quantum phenomena in a highly manufacturable electronic device operating at room temperature. Conventional spectral analysis techniques, when applied to our QUFs, will enable reliable generation of unpredictable unique identities which can be employed in advanced authentication systems.

  20. Final report and recommendations of the ESnet Authentication Pilot Project

    SciTech Connect (OSTI)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01T23:59:59.000Z

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  1. The rice kinase database. A phylogenomic database for the rice kinome.

    E-Print Network [OSTI]

    Dardick, Christopher; Chen, Johann; Richter, Todd; Ouyang, Shu; Ronald, Pamela

    2007-01-01T23:59:59.000Z

    Bioinformatics The Rice Kinase Database.A Phylogenomic Database for the Rice Kinome 1[OA]created a phylogenomic database (http://rkd.ucdavis.edu) to

  2. Modularization of the DADAISM Ada Database System Architecture

    E-Print Network [OSTI]

    Keller, Arthur M.

    the modularization of a new data- base management system architecture. This DBMS is not intended to be viewed 22, 1986 at Beijing, China. of modulespeci cations for a DBMS, which can be used to support any implemen- tation paradigm is necessary to handle the evolution of database systems over the next few

  3. Modularization of the DADAISM Ada Database System Architecture

    E-Print Network [OSTI]

    Keller, Arthur M.

    the modularization of a new data­ base management system architecture. This DBMS is not intended to be viewed--22, 1986 at Beijing, China. of module specifications for a DBMS, which can be used to support any of those implemen­ tation paradigm is necessary to handle the evolution of database systems over the next few

  4. Stress Testing of Transactional Database Systems Jorge Augusto Meira

    E-Print Network [OSTI]

    Boyer, Edmond

    of Montpellier, France patrick.valduriez@inria.fr Abstract. Transactional database management systems (DBMS) have-based applications that tend to generate huge numbers of concurrent business operations are pushing DBMS performance to test DBMS performance under heavy workload conditions. Answering this question requires a testing

  5. Grid Database Service Specification Document Identifier: GDSS-0.2

    E-Print Network [OSTI]

    Glasgow, University of

    Grid Database Service Specification Document Identifier: GDSS-0.2 Date: 4th October 2002 Authors of networked resources. The Open Grid Services Architecture (OGSA) extends Web Services with consistent interfaces for creating, managing and exchanging information among Grid Services, which are dynamic

  6. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01T23:59:59.000Z

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  7. Efficient Disk-based K-means Clustering for Relational Databases

    E-Print Network [OSTI]

    Ordonez, Carlos

    1 Efficient Disk-based K-means Clustering for Relational Databases Carlos Ordonez Edward Omiecinski Teradata, NCR Georgia Institute of Technology San Diego, CA 92127, USA Atlanta, GA 30332, USA Abstract--K-means- plementation of K-means. The proposed algorithm is designed to work inside a relational database management

  8. PATSEEK: Content Based Image Retrieval System for Patent Database Avinash Tiwari1

    E-Print Network [OSTI]

    Bansal, Veena

    PATSEEK: Content Based Image Retrieval System for Patent Database Avinash Tiwari1 , Veena Bansal2 1,2 Industrial and Management Engineering Department IIT Kanpur 208016 India 2 veena@iitk.ac.in ABSTRACT A patent the patent database. In this paper, we describe PATSEEK that is an image based search system for US patent

  9. A Bayesian Approach to Online Performance Modeling for Database Appliances using Gaussian Models

    E-Print Network [OSTI]

    Waterloo, University of

    agreements (SLAs) and to maintain peak performance for database management systems (DBMS), database, and resource provisioning. Accurately predicting response times of DBMS queries is necessary for a DBA an efficient and highly ac- curate online DBMS performance model that is robust in the face of changing

  10. A Bayesian Approach to Online Performance Modeling for Database Appliances using Gaussian Models

    E-Print Network [OSTI]

    Aboulnaga, Ashraf

    - tain peak performance for database management systems (DBMS), database administrators (DBAs) need. Accurately predicting response times of DBMS queries is necessary for a DBA to effectively achieve and highly accurate online DBMS performance model that is robust in the face of changing workloads, data

  11. RemusDB: Transparent High Availability for Database Umar Farooq Minhas Shriram Rajagopalan Brendan Cully Ashraf

    E-Print Network [OSTI]

    Aboulnaga, Ashraf

    present a technique for building a high-availability (HA) database management system (DBMS). The proposed technique can be ap- plied to any DBMS with little or no customization, and with reasonable performance capabilities. We show that while Remus and similar systems can protect a DBMS, database workloads incur

  12. Secure Database Development Jan Jurjens (1) and Eduardo B. Fernandez (2)

    E-Print Network [OSTI]

    Jurjens, Jan

    , Florida Atlantic University, Boca Raton, FL 33431, USA http://www.cse.fau.edu/~ed Synonyms Secure DBMS in this encyclopedia (Database security). This section concentrates mostly on how to build the software of a DBMS, 6], there is little work on how to implement a secure Database Management System (DBMS). It is true

  13. Florida International University Technical Report TR-2006-09-02 STORM: An Approach to Database Storage

    E-Print Network [OSTI]

    Rangaswami, Raju

    Storage Management in Data Center Environments Kaushik Dutta Raju Rangaswami Florida International University Miami, FL 33199 kaushik.dutta@fiu.edu raju@cs.fiu.edu #12;STORM: An Approach to Database Storage Sciences Florida International University Miami, FL - 33199, USA raju@cs.fiu.edu Abstract Database storage

  14. Vienna Database Library Version 1.0

    E-Print Network [OSTI]

    Neumaier, Arnold

    Vienna Database Library Version 1.0 Reference Manual Hermann Schichl University of Vienna.2.14 #12;CONTENTS 1 Contents 1 Introduction 1 2 Vienna Database Library Module Index 3 3 Vienna Database Library Hierarchical Index 3 4 Vienna Database Library Compound Index 5 5 Vienna Database Library File

  15. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  16. Chapter 20Chapter 20 Physical Database

    E-Print Network [OSTI]

    Yang, Jing

    1 Chapter 20Chapter 20 Physical Database Design and Tuning Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1. Physical Database Design in Relational Databases (1) Factors that Influence Physical Database Design: A. Analyzing the database queries and transactionsA. Analyzing

  17. DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN,

    E-Print Network [OSTI]

    Richner, Heinz

    i DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN, CHAOPRAYA Sludge (FS) management and lacking of data on FS collection, treatment and disposal. Nevertheless, FS

  18. Framework for database and modelbase in an Information based Simulation system

    E-Print Network [OSTI]

    Ghoshal, Debashis

    1988-01-01T23:59:59.000Z

    at improving the performance of relational database management systems has progressed through both software and hardware approaches. Rapid progress is being made in the improved performance of relational DBMS. Hence in this research we apply a relational...

  19. Business intelligence systems and user's parameters: an application to a documents' database

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    on a cognitive user evolution is presented. This model when used together with a good definition by a relational database management system (DBMS). Also, from this data warehouse is extracted multidimensional

  20. EDIC RESEARCH PROPOSAL 1 A Trustworthy Physical Designer for Databases in

    E-Print Network [OSTI]

    DIAS, I&C, EPFL Abstract--Configuring a state-of-the-art database management system (DBMS) to provide's estimates, they can propose designs that result in degraded instead of improved performance. Nowadays, DBMS

  1. Home Heating Systems Design using PHP and MySQL Databases

    E-Print Network [OSTI]

    Karnyanszky, Tiberiu Marius

    2009-01-01T23:59:59.000Z

    This paper presents the use of a computer application based on a MySQL database, managed by PHP programs, allowing the selection of a heating device using coefficient-based calculus.

  2. Portland State University Confidentiality and Information Management Policy and Procedures

    E-Print Network [OSTI]

    Bertini, Robert L.

    Portland State University Confidentiality and Information Management Policy and Procedures I and INFORMATION MANAGEMENT POLICY and PROCEDURES Confidentiality and Information Management Policy Information to in the rest of this document as "Confidential University Information." Database records, documents

  3. IMPROVING DATABASE DESIGN TEACHING IN SECONDARY EDUCATION

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Review Copy IMPROVING DATABASE DESIGN TEACHING IN SECONDARY EDUCATION: ACTION RESEARCH Education, University of Patras, 26500, Patras, GREECE. Abstract Database design and use has educational interest for utilitarian and learning reasons. Database technology has significant economic impact

  4. Intelligent Transportation Systems Deployment Statistics Database

    E-Print Network [OSTI]

    Intelligent Transportation Systems Deployment Statistics Database Oak Ridge National Laboratory direction. In addition, through the ITS Deployment Tracking web site, the database supports other users in 2010. Users can also download the entire 2010 deployment tracking database through the website

  5. Meteorological database for the United States

    E-Print Network [OSTI]

    Apte, M.G.

    2011-01-01T23:59:59.000Z

    to Indoor Air Meteorological Database for the United StatesUC-402 Meteorological Database for the United States M.G.Abstract A meteorological database has been developed to aid

  6. Solid Waste Projection Model: Database (Version 1.3). Technical reference manual

    SciTech Connect (OSTI)

    Blackburn, C.L.

    1991-11-01T23:59:59.000Z

    The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.3 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement.

  7. Sandia Energy - Sandia Wind Turbine Loads Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Wind Turbine Loads Database Home Stationary Power Energy Conversion Efficiency Wind Energy Resources Wind Software Downloads Sandia Wind Turbine Loads Database Sandia Wind...

  8. Hydrogen Storage Materials Database Demonstration Webinar (Text...

    Broader source: Energy.gov (indexed) [DOE]

    Database Demonstration Webinar (Text Version) Hydrogen Storage Materials Database Demonstration Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen...

  9. Sandia National Laboratories: national reliability database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    national reliability database Third Annual Continuous Reliability Enhancement for Wind (CREW) Database Report Now Available On October 17, 2013, in Energy, News, News & Events,...

  10. SIX GOING ON SEVEN Database Dictionary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SIX GOING ON SEVEN Database Dictionary This database dictionary provides a brief explanation of measure naming schemes and mapping used to align the Northwest Power and...

  11. Buildings Performance Database Analysis Tools | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Performance Database Analysis Tools The Buildings Performance Database offers several analysis tools for exploring building data and forecasting financial and energy savings,...

  12. Marine and Hydrokinetic Technology Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    DOE’s Marine and Hydrokinetic Technology Database provides up-to-date information on marine and hydrokinetic renewable energy, both in the U.S. and around the world. The database includes wave, tidal, current, and ocean thermal energy, and contains information on the various energy conversion technologies, companies active in the field, and development of projects in the water. Depending on the needs of the user, the database can present a snapshot of projects in a given region, assess the progress of a certain technology type, or provide a comprehensive view of the entire marine and hydrokinetic energy industry. Results are displayed as a list of technologies, companies, or projects. Data can be filtered by a number of criteria, including country/region, technology type, generation capacity, and technology or project stage. The database was updated in 2009 to include ocean thermal energy technologies, companies, and projects.

  13. ORISE: Human Subjects Research Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Research Database Section 10, Part 745 of the Code of Federal Regulations and U.S. Department of Energy (DOE) Orders 443.1 and 481.1 require the maintenance of...

  14. Rice Glycosyltransferase (GT) Phylogenomic Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Ronald, Pamela

    The Ronald Laboratory staff at the University of California-Davis has a primary research focus on the genes of the rice plant. They study the role that genetics plays in the way rice plants respond to their environment. They created the Rice GT Database in order to integrate functional genomic information for putative rice Glycosyltransferases (GTs). This database contains information on nearly 800 putative rice GTs (gene models) identified by sequence similarity searches based on the Carbohydrate Active enZymes (CAZy) database. The Rice GT Database provides a platform to display user-selected functional genomic data on a phylogenetic tree. This includes sequence information, mutant line information, expression data, etc. An interactive chromosomal map shows the position of all rice GTs, and links to rice annotation databases are included. The format is intended to "facilitate the comparison of closely related GTs within different families, as well as perform global comparisons between sets of related families." [From http://ricephylogenomics.ucdavis.edu/cellwalls/gt/genInfo.shtml] See also the primary paper discussing this work: Peijian Cao, Laura E. Bartley, Ki-Hong Jung and Pamela C. Ronalda. Construction of a Rice Glycosyltransferase Phylogenomic Database and Identification of Rice-Diverged Glycosyltransferases. Molecular Plant, 2008, 1(5): 858-877.

  15. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06T23:59:59.000Z

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  16. Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information

    E-Print Network [OSTI]

    Jeong, Jin Su

    2006-10-30T23:59:59.000Z

    to make it efficient. A database requires a database management system (DBMS), a set of computer programs for organizing the information in a database, to manage its structure and control access to the data stored in the database [9]. A DBMS supports... the structuring of the database in a standard format and provides tools for data input, verification, storage, retrieval, query, and manipulation. According to Ramakishman [26], DBMS is software, designed to assist in maintaining and utilizing large collection...

  17. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  18. A DATABASE FOR TRACKING POPULATIONS OF ENDANGERED, THREATENED, PROPOSED AND CANDIDATE SPECIES IN NATIONAL PARKS External Information Gathered Year-Round from Lists, Documents, Websites, etc.

    E-Print Network [OSTI]

    A DATABASE FOR TRACKING POPULATIONS OF ENDANGERED, THREATENED, PROPOSED AND CANDIDATE SPECIES Expenditure Report Sent out to USFWS in October ( http://www.nature.nps.gov/biology/endangeredspecies/database, and the Endangered Species Program Manager at the Washington Office. Implement a database system that tracks

  19. A snapshot in time - the new TRUplanner database - 10400

    SciTech Connect (OSTI)

    Estill, Wes [Los Alamos National Laboratory; Crawford, Beverly A [Los Alamos National Laboratory; Van Soest, Gregory D [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    A new database was developed to augment transuranic (TRU) waste inventory information already captured within the Comprehensive Inventory Database (CID). This new database, known as the TRUplanner, includes information focused on site capability for TRU waste certification and availability to ship to either the Waste Isolation Pilot Plant (WIPP) or Idaho National Laboratory for final characterization and certification before coming to WIPP. Waste stream specific data is imported from the CID to the TRUplanner, and additional data is collected and entered as a result of interviews and site visits. This data is continuously updated as sites are visited. TRU waste information such as facility, equipment, and container information for waste streams, has been captured within the TRUplanner, and supports the Department of Energy, Carlsbad Field Office (CBFO) decision making and strategic planning activities. This infonnation is delivered via three built-in TRUplanner reports that are provided to CBFO management, Acceptable Knowledge (AK) Experts and the TRU Waste Inventory Team.

  20. DATATRIEVE used in a control-system database

    SciTech Connect (OSTI)

    Greene, N.E.

    1983-01-01T23:59:59.000Z

    Process control of the Proton Storage Ring at Los Alamos will be accomplished by LSI-11/23 computers networked with a VAX-11/750. The database contains descriptions, status, and parameters of the hardware channels and equipment connected to the LSIs. Database entry and processing occur on the VAX, largely through DATATRIEVE user-friendly procedures. Data validity is checked during and after data entry by DATATRIEVE and FORTRAN language procedures. The database then is distilled into a machine-efficient form and distributed to the LSIs and VAX for use by the process-control software. This paper includes an overview of our application, an overview of DATATRIEVE, examples of DATATRIEVE concepts, features of DATATRIEVE that have been especially useful, features of DATATRIEVE that have been troublesome in this project, notes about the conversion from DATATRIEVE-11 to VAX-11 DATATRIEVE, and observations on data-management software in a control-system environment.

  1. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21T23:59:59.000Z

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  2. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01T23:59:59.000Z

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  3. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  4. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    be used to replace Wegman-Carter's classical authentication scheme in quantum key distribution (QKD the QKD protocol to bootstrap. The authenti- cation scheme commonly used in QKD is the Wegman

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  7. Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time

    E-Print Network [OSTI]

    Liwinski, Thomas

    2011-10-21T23:59:59.000Z

    , it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

  8. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  9. Protein sequence databases Rolf Apweiler1,

    E-Print Network [OSTI]

    Information NREF non-redundant reference databases PDB Protein Data Bank PIR Protein Information Resource PIR

  10. Benchmarking Database Systems A Systematic Approach

    E-Print Network [OSTI]

    Liblit, Ben

    Benchmarking Database Systems A Systematic Approach Dina Bitton David J. DeWitt Carolyn Turbyfill-81ER10920. #12;ABSTRACT This paper describes a customized database and a comprehensive set of queries that can be used for sys- tematic benchmarking of relational database systems. Designing this database

  11. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  12. Design and implementation of a departmental information management system

    E-Print Network [OSTI]

    Xie, Dawen

    2009-05-15T23:59:59.000Z

    Management System (DBMS); 4. logical design; 5. physical design and 6. implementation. The following section brie y walks through each step [5]. The goals of the requirements analysis (Step 1) are to determine the data re- quirements of the database in terms... program, a degree program involves di erent documents. A Database Management System (DBMS) is computer software designed for the purpose of managing databases. Typical examples of DBMSs include Oracle, Microsoft SQL Server, and MySQL. Step 3 involves...

  13. Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)

    SciTech Connect (OSTI)

    Timothy R. Carr; Scott W. White

    2002-06-01T23:59:59.000Z

    This annual report describes progress of the project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is working to provide advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. The MIDCARB project is developing improved online tools to provide real-time display and analyze CO{sub 2} sequestration data. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

  14. Compression Aware Physical Database Design

    E-Print Network [OSTI]

    Kimura, Hideaki; Syamala, Manoj

    2011-01-01T23:59:59.000Z

    Modern RDBMSs support the ability to compress data using methods such as null suppression and dictionary encoding. Data compression offers the promise of significantly reducing storage requirements and improving I/O performance for decision support queries. However, compression can also slow down update and query performance due to the CPU costs of compression and decompression. In this paper, we study how data compression affects choice of appropriate physical database design, such as indexes, for a given workload. We observe that approaches that decouple the decision of whether or not to choose an index from whether or not to compress the index can result in poor solutions. Thus, we focus on the novel problem of integrating compression into physical database design in a scalable manner. We have implemented our techniques by modifying Microsoft SQL Server and the Database Engine Tuning Advisor (DTA) physical design tool. Our techniques are general and are potentially applicable to DBMSs that support other co...

  15. National Residential Efficiency Measures Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

  16. DOE Global Energy Storage Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The DOE International Energy Storage Database has more than 400 documented energy storage projects from 34 countries around the world. The database provides free, up-to-date information on grid-connected energy storage projects and relevant state and federal policies. More than 50 energy storage technologies are represented worldwide, including multiple battery technologies, compressed air energy storage, flywheels, gravel energy storage, hydrogen energy storage, pumped hydroelectric, superconducting magnetic energy storage, and thermal energy storage. The policy section of the database shows 18 federal and state policies addressing grid-connected energy storage, from rules and regulations to tariffs and other financial incentives. It is funded through DOE’s Sandia National Laboratories, and has been operating since January 2012.

  17. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect (OSTI)

    Matthew Vranicar; John Weicher

    2006-04-17T23:59:59.000Z

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

  18. asset management system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    techniques for early error detection and fast recovery in a database management system (DBMS California at Irvine, University of 405 Division of Information Information Systems...

  19. asthma management system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    techniques for early error detection and fast recovery in a database management system (DBMS California at Irvine, University of 302 Division of Information Information Systems...

  20. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  1. Status Report on the Creation of a Preliminary Data Model and Dictionary for a New Petrologic Database

    SciTech Connect (OSTI)

    Mackley, Rob D.; Serkowski, John A.; Last, George V.

    2008-06-30T23:59:59.000Z

    A preliminary database has been developed that will allow mineralogy and bulk-rock geochemical information to be managed under configuration control and facilitate electronic querying. The database is currently developed in Microsoft Access as a collection of tables, views, and entry forms. Each field and table has been described in a data dictionary.

  2. Workload-Aware Database Monitoring and Consolidation

    E-Print Network [OSTI]

    Curino, Carlo

    In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 production servers from different organizations, ...

  3. Webinar: NREL's Fuel Cell Contaminant Database

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled "NREL's Fuel Cell Contaminant Database," originally presented on May 27, 2014.

  4. Buildings Performance Database Recommend Data Fields | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Renewable Energy. bpdrecommendeddatafields.pdf More Documents & Publications BEDES Beta Data Preparation Process for the Buildings Performance Database Commercial Building...

  5. Webinar: Hydrogen Storage Materials Database Demonstration

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar, Hydrogen Storage Materials Database Demonstration, originally presented on December 13, 2011.

  6. 1991-2005 National Solar Radiation Database

    SciTech Connect (OSTI)

    Wilcox, S.

    2007-05-01T23:59:59.000Z

    This fact sheet provides an overview of the purpose, benefit, and features of the newly updated National Solar Radiation Database.

  7. Search Log Analysis of the ARTstor Cultural Heritage Image Database

    E-Print Network [OSTI]

    Lowe, Heather Ann

    2013-01-01T23:59:59.000Z

    Patterns in a Digital Image Database. Information RetrievalCultural Heritage Image Database A thesis submitted inCultural Heritage Image Database by Heather Ann Lowe Master

  8. The Majorana Parts Tracking Database

    E-Print Network [OSTI]

    Abgrall, N; Avignone, F T; Bertrand, F E; Brudanin, V; Busch, M; Byram, D; Caldwell, A S; Chan, Y-D; Christofferson, C D; Combs, D C; Cuesta, C; Detwiler, J A; Doe, P J; Efremenko, Yu; Egorov, V; Ejiri, H; Elliott, S R; Esterline, J; Fast, J E; Finnerty, P; Fraenkle, F M; Galindo-Uribarri, A; Giovanetti, G K; Goett, J; Green, M P; Gruszko, J; Guiseppe, V E; Gusev, K; Hallin, A L; Hazama, R; Hegai, A; Henning, R; Hoppe, E W; Howard, S; Howe, M A; Keeter, K J; Kidd, M F; Kochetov, O; Kouzes, R T; LaFerriere, B D; Leon, J Diaz; Leviner, L E; Loach, J C; MacMullin, J; Martin, R D; Meijer, S J; Mertens, S; Miller, M L; Mizouni, L; Nomachi, M; Orrell, J L; O'Shaughnessy, C; Overman, N R; Petersburg, R; Phillips, D G; Poon, A W P; Pushkin, K; Radford, D C; Rager, J; Rielage, K; Robertson, R G H; Romero-Romero, E; Ronquest, M C; Shanks, B; Shima, T; Shirchenko, M; Snavely, K J; Snyder, N; Soin, A; Suriano, A M; Tedeschi, D; Thompson, J; Timkin, V; Tornow, W; Trimble, J E; Varner, R L; Vasilyev, S; Vetter, K; Vorren, K; White, B R; Wilkerson, J F; Wiseman, C; Xu, W; Yakushev, E; Young, A R; Yu, C -H; Zhitnikov, I

    2015-01-01T23:59:59.000Z

    The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

  9. The Majorana Parts Tracking Database

    E-Print Network [OSTI]

    The Majorana Collaboration; N. Abgrall; E. Aguayo; F. T. Avignone III; A. S. Barabash; F. E. Bertrand; V. Brudanin; M. Busch; D. Byram; A. S. Caldwell; Y-D. Chan; C. D. Christofferson; D. C. Combs; C. Cuesta; J. A. Detwiler; P. J. Doe; Yu. Efremenko; V. Egorov; H. Ejiri; S. R. Elliott; J. Esterline; J. E. Fast; P. Finnerty; F. M. Fraenkle; A. Galindo-Uribarri; G. K. Giovanetti; J. Goett; M. P. Green; J. Gruszko; V. E. Guiseppe; K. Gusev; A. L. Hallin; R. Hazama; A. Hegai; R. Henning; E. W. Hoppe; S. Howard; M. A. Howe; K. J. Keeter; M. F. Kidd; O. Kochetov; S. I. Konovalov; R. T. Kouzes; B. D. LaFerriere; J. Diaz Leon; L. E. Leviner; J. C. Loach; J. MacMullin; R. D. Martin; S. J. Meijer; S. Mertens; M. L. Miller; L. Mizouni; M. Nomachi; J. L. Orrell; C. O'Shaughnessy; N. R. Overman; R. Petersburg; D. G. Phillips II; A. W. P. Poon; K. Pushkin; D. C. Radford; J. Rager; K. Rielage; R. G. H. Robertson; E. Romero-Romero; M. C. Ronquest; B. Shanks; T. Shima; M. Shirchenko; K. J. Snavely; N. Snyder; A. Soin; A. M. Suriano; D. Tedeschi; J. Thompson; V. Timkin; W. Tornow; J. E. Trimble; R. L. Varner; S. Vasilyev; K. Vetter; K. Vorren; B. R. White; J. F. Wilkerson; C. Wiseman; W. Xu; E. Yakushev; A. R. Young; C. -H. Yu; V. Yumatov; I. Zhitnikov

    2015-02-05T23:59:59.000Z

    The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

  10. GRAPHDB -a database of Axel Kohnert

    E-Print Network [OSTI]

    Laue, Reinhard

    GRAPHDB - a database of graphs March 2003 Axel Kohnert University of Bayreuth http://btm2xg ADMIN DBUSER ¡£¢ DB ¤ ¥ GRAPHVIEWER ¦ GRAPHSERVER #12;A: The Database Part I. THE MASTER TABLE #12;B: The client access to the database There are several web pages which allow the search

  11. Comprehensive Database on Concrete Creep and Shrinkage

    E-Print Network [OSTI]

    Comprehensive Database on Concrete Creep and Shrinkage Zdenek P. Bazant and Guang-Hua Li Structural Database on Concrete Creep and Shrinkage Zdenek P. Bazant1 and Guang-Hua Li2 Abstract: As a sequel to the first large database created at Northwestern University in 1978, the paper presents a further

  12. Computer Note A Prototype Object Database for

    E-Print Network [OSTI]

    Neigel, Joseph E.

    Computer Note A Prototype Object Database for Mitochondrial DNA Variation J. E. NEIGEL AND P preserved. We hope to prevent further loss by establishing a community database for population genetic surveys. We explored the feasibility of a population genetics database by developing a prototype

  13. 8, 76577702, 2008 A new database of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ACPD 8, 7657­7702, 2008 A new database of trace gases and aerosols B. Hassler et al. Title Page.0 License. Atmospheric Chemistry and Physics Discussions Technical Note: A new global database of trace­7702, 2008 A new database of trace gases and aerosols B. Hassler et al. Title Page Abstract Introduction

  14. GOLD: The Genomes Online Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kyrpides, Nikos; Liolios, Dinos; Chen, Amy; Tavernarakis, Nektarios; Hugenholtz, Philip; Markowitz, Victor; Bernal, Alex

    Since its inception in 1997, GOLD has continuously monitored genome sequencing projects worldwide and has provided the community with a unique centralized resource that integrates diverse information related to Archaea, Bacteria, Eukaryotic and more recently Metagenomic sequencing projects. As of September 2007, GOLD recorded 639 completed genome projects. These projects have their complete sequence deposited into the public archival sequence databases such as GenBank EMBL,and DDBJ. From the total of 639 complete and published genome projects as of 9/2007, 527 were bacterial, 47 were archaeal and 65 were eukaryotic. In addition to the complete projects, there were 2158 ongoing sequencing projects. 1328 of those were bacterial, 59 archaeal and 771 eukaryotic projects. Two types of metadata are provided by GOLD: (i) project metadata and (ii) organism/environment metadata. GOLD CARD pages for every project are available from the link of every GOLD_STAMP ID. The information in every one of these pages is organized into three tables: (a) Organism information, (b) Genome project information and (c) External links. [The Genomes On Line Database (GOLD) in 2007: Status of genomic and metagenomic projects and their associated metadata, Konstantinos Liolios, Konstantinos Mavromatis, Nektarios Tavernarakis and Nikos C. Kyrpides, Nucleic Acids Research Advance Access published online on November 2, 2007, Nucleic Acids Research, doi:10.1093/nar/gkm884]

    The basic tables in the GOLD database that can be browsed or searched include the following information:

    • Gold Stamp ID
    • Organism name
    • Domain
    • Links to information sources
    • Size and link to a map, when available
    • Chromosome number, Plas number, and GC content
    • A link for downloading the actual genome data
    • Institution that did the sequencing
    • Funding source
    • Database where information resides
    • Publication status and information

    (Specialized Interface)

  15. Stockpile Dismantlement Database Training Materials

    SciTech Connect (OSTI)

    Not Available

    1993-11-01T23:59:59.000Z

    This document, the Stockpile Dismantlement Database (SDDB) training materials is designed to familiarize the user with the SDDB windowing system and the data entry steps for Component Characterization for Disposition. The foundation of information required for every part is depicted by using numbered graphic and text steps. The individual entering data is lead step by step through generic and specific examples. These training materials are intended to be supplements to individual on-the-job training.

  16. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  17. Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and

    E-Print Network [OSTI]

    Baras, John S.

    Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

  18. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)

    E-Print Network [OSTI]

    Basin, David

    A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

  19. Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas

    E-Print Network [OSTI]

    Sabatini, David M.

    Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai}@mit.edu ABSTRACT A major security concern with outsourcing data storage to third- party providers is authenticating hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa- per proposes

  20. Geothermal NEPA Database on OpenEI (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) developed the Geothermal National Environmental Policy Act (NEPA) Database as a platform for government agencies and industry to access and maintain information related to geothermal NEPA documents. The data were collected to inform analyses of NEPA timelines, and the collected data were made publically available via this tool in case others might find the data useful. NREL staff and contractors collected documents from agency websites, during visits to the two busiest Bureau of Land Management (BLM) field offices for geothermal development, and through email and phone call requests from other BLM field offices. They then entered the information into the database, hosted by Open Energy Information (http://en.openei.org/wiki/RAPID/NEPA). The long-term success of the project will depend on the willingness of federal agencies, industry, and others to populate the database with NEPA and related documents, and to use the data for their own analyses. As the information and capabilities of the database expand, developers and agencies can save time on new NEPA reports by accessing a single location to research related activities, their potential impacts, and previously proposed and imposed mitigation measures. NREL used a wiki platform to allow industry and agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users.

  1. Databases

    E-Print Network [OSTI]

    Mcgregor, D.; Cockshott, P.; Wilson, J.; US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press [More Details

    Mcgregor,D. Cockshott,P. Wilson,J. US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press

  2. The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation

    E-Print Network [OSTI]

    Busso, Carlos

    The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation Angeliki Metallinou' creativity. The USC CreativeIT database provides a novel bridge between the study of theatrical improvisation and human expressive behavior in dyadic interaction. The theoretical design of the database is based

  3. NIST Standard Reference Database 88 NIST/TRC Ideal Gas Database

    E-Print Network [OSTI]

    Magee, Joseph W.

    #12;NIST Standard Reference Database 88 NIST/TRC Ideal Gas Database Version 2.0 Users' Guide Data of the database and to verify that the data contained therein have been selected on the basis of sound scientific that may result from errors or omissions in the database. COPYRIGHT (C) 2006 copyright by the U

  4. Data Management Guide: Integrated Baseline System (IBS). Version 2.1

    SciTech Connect (OSTI)

    Bower, J.C. [Bower Software Services, Kennewick, Washington (United States)] Bower Software Services, Kennewick, Washington (United States); Burford, M.J.; Downing, T.R.; Moise, M.C.; Williams, J.R. [Pacific Northwest Lab., Richland, WA (United States)] Pacific Northwest Lab., Richland, WA (United States)

    1995-01-01T23:59:59.000Z

    The Integrated Baseline System (IBS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Nuclear and Chemical Agency (USANCA). The IBS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain a site-specific map database. Data and system managers use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of the IBS. This document provides a description of the data files and structures necessary for running the IBS software and using the site map database.

  5. DISTRIBUTED DATA MANAGEMENT: UNSOLVED PROBLEMS AND NEW ISSUES*

    E-Print Network [OSTI]

    Özsu, M. Tamer

    -1- DISTRIBUTED DATA MANAGEMENT: UNSOLVED PROBLEMS AND NEW ISSUES* M. Tamer Özsu GTE Laboratories Chesnay France patrickv@madonna.inria.fr ABSTRACT Distributed database technology is expected to have, expectations are that distributed database management systems will by and large replace centralized ones within

  6. Overview of selected molecular biological databases

    SciTech Connect (OSTI)

    Rayl, K.D.; Gaasterland, T.

    1994-11-01T23:59:59.000Z

    This paper presents an overview of the purpose, content, and design of a subset of the currently available biological databases, with an emphasis on protein databases. Databases included in this summary are 3D-ALI, Berlin RNA databank, Blocks, DSSP, EMBL Nucleotide Database, EMP, ENZYME, FSSP, GDB, GenBank, HSSP, LiMB, PDB, PIR, PKCDD, ProSite, and SWISS-PROT. The goal is to provide a starting point for researchers who wish to take advantage of the myriad available databases. Rather than providing a complete explanation of each database, we present its content and form by explaining the details of typical entries. Pointers to more complete ``user guides`` are included, along with general information on where to search for a new database.

  7. This overview covers: Connecting to a Chado Database

    E-Print Network [OSTI]

    Maizels, Rick

    This overview covers: · Connecting to a Chado Database · Reading From the Database · iBatis Database Mapping · Gene Representation · Gene Building · Gene merging and splitting · Transfer Annotation Tool · Writing To The Database · Opening the Standalone Gene Builder · Community Annotation · Writing

  8. Development of a Series of National Coalbed Methane Databases

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    . · Offer in one set public literature, reservoir characteristics and production data available. · Are easy Asset ­ Scattered Public Data Motivations #12;Information in Hand · CBM - Literature Database · CBM - Reservoir Characteristics Database · CBM - Production Database #12;CBM - Literature Database · SPE Papers

  9. Enhancing the DNA Patent Database

    SciTech Connect (OSTI)

    Walters, LeRoy B.

    2008-02-18T23:59:59.000Z

    Final Report on Award No. DE-FG0201ER63171 Principal Investigator: LeRoy B. Walters February 18, 2008 This project successfully completed its goal of surveying and reporting on the DNA patenting and licensing policies at 30 major U.S. academic institutions. The report of survey results was published in the January 2006 issue of Nature Biotechnology under the title “The Licensing of DNA Patents by US Academic Institutions: An Empirical Survey.” Lori Pressman was the lead author on this feature article. A PDF reprint of the article will be submitted to our Program Officer under separate cover. The project team has continued to update the DNA Patent Database on a weekly basis since the conclusion of the project. The database can be accessed at dnapatents.georgetown.edu. This database provides a valuable research tool for academic researchers, policymakers, and citizens. A report entitled Reaping the Benefits of Genomic and Proteomic Research: Intellectual Property Rights, Innovation, and Public Health was published in 2006 by the Committee on Intellectual Property Rights in Genomic and Protein Research and Innovation, Board on Science, Technology, and Economic Policy at the National Academies. The report was edited by Stephen A. Merrill and Anne-Marie Mazza. This report employed and then adapted the methodology developed by our research project and quoted our findings at several points. (The full report can be viewed online at the following URL: http://www.nap.edu/openbook.php?record_id=11487&page=R1). My colleagues and I are grateful for the research support of the ELSI program at the U.S. Department of Energy.

  10. Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    E-Print Network [OSTI]

    , authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

  11. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  12. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department

  13. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  14. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere is a

  15. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  16. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  17. The Dartmouth Stellar Evolution Database

    E-Print Network [OSTI]

    Aaron Dotter; Brian Chaboyer; Darko Jevremovic; Veselin Kostov; E. Baron; J. W. Ferguson

    2008-04-28T23:59:59.000Z

    The ever-expanding depth and quality of photometric and spectroscopic observations of stellar populations increase the need for theoretical models in regions of age-composition parameter space that are largely unexplored at present. Stellar evolution models that employ the most advanced physics and cover a wide range of compositions are needed to extract the most information from current observations of both resolved and unresolved stellar populations. The Dartmouth Stellar Evolution Database is a collection of stellar evolution tracks and isochrones that spans a range of [Fe/H] from -2.5 to +0.5, [alpha/Fe] from -0.2 to +0.8 (for [Fe/H] 0), and initial He mass fractions from Y=0.245 to 0.40. Stellar evolution tracks were computed for masses between 0.1 and 4 Msun, allowing isochrones to be generated for ages as young as 250 Myr. For the range in masses where the core He flash occurs, separate He-burning tracks were computed starting from the zero age horizontal branch. The tracks and isochrones have been transformed to the observational plane in a variety of photometric systems including standard UBV(RI)c, Stromgren uvby, SDSS ugriz, 2MASS JHKs, and HST ACS-WFC and WFPC2. The Dartmouth Stellar Evolution Database is accessible through a website at http://stellar.dartmouth.edu/~models/ where all tracks, isochrones, and additional files can be downloaded.

  18. MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)

    SciTech Connect (OSTI)

    Timothy R. Carr; Scott W. White

    2003-07-01T23:59:59.000Z

    This annual report describes progress in the second year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is providing advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. Data is being assembled to analyze CO{sub 2} sequestration potential from a single object (e.g., power plant or well) to a region and across geographic boundaries. The MIDCARB system is robust and capable of being updated from multiple sources on a daily basis. The MIDCARB project has developed improved online tools to provide real-time display and analysis of CO{sub 2} sequestration data. The MIDCARB project is a functional template for distributed data systems to address CO{sub 2} sequestration and other natural resource issues that cross the boundaries between institutions and geographic areas. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

  19. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  20. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Yang, Junfeng

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  1. Simplified authenticated key exchange based on the q(th) root problem

    SciTech Connect (OSTI)

    JOHNSTON,ANNA M.; GEMMELL,PETER S.

    2000-02-29T23:59:59.000Z

    Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

  2. Distillation Codes and Applications to DoS Resistant Multicast Authentication

    E-Print Network [OSTI]

    Perrig, Adrian

    Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

  3. MMH: Software Message Authentication in the Gbit/second Rates \\Lambda

    E-Print Network [OSTI]

    Bernstein, Daniel

    universal hashing) applications. The construction is based on techniques due to Carter and Wegman Universal hash functions, which were first introduced by Carter and Wegman in [CW79], have a wide range authentication (introduced by Wegman and Carter [WC81] as well) received much attention lately. In particular

  4. MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell

    E-Print Network [OSTI]

    Martinian, Emin

    MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell Dept,gwwˇ @mit.edu ABSTRACT In many multimedia applications, there is a need to authen- ticate a source that has signature techniques are a natural tool for addressing such problems. However, in many emerging multimedia

  5. SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

  6. On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On optimizing energy consumption: An adaptative authentication level in wireless sensor networks-hungry. As energy is a scarce resource in wireless sensor networks, we propose a new approach that consists or third-party nodes. I. INTRODUCTION Wireless sensor networks (WSNs) are used in several fields

  7. An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana

  8. CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment

    E-Print Network [OSTI]

    Michigan, University of

    . An unfortunate byproduct of building Kerberos-based systems is a loss of functionality, such as long running jobs-- -- CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment A. D. Rubin that a user have a valid token or ticket for a job to run. These tickets are issued with limited lifetimes

  9. Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    Brylow, Dennis

    based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

  10. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  11. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  12. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

    E-Print Network [OSTI]

    Braun, Torsten

    1 Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network is to avoid exchanging security information between networks visited by a roaming user and the user's home network and retrieves the required security information from that AAA server. The AAA servers can

  13. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  14. Sealion Database: Tracking and Characterization of Legacy Wastes

    SciTech Connect (OSTI)

    Michel Hall; Brady Orchard; Brett Welty; James Rivera; Paul Walker; Reese Gannon

    2010-03-01T23:59:59.000Z

    The Radioactive Scrap and Waste Facility Liner-by-Liner Characterization Project was initiated to support waste management planning and disposition activities at the Materials and Fuels Complex located at the Idaho National Laboratory. The project scope consisted of a detailed examination of available historical records to consolidate information and eliminate discrepancies between sources. This information was captured in a new comprehensive searchable online database dubbed Sealion (Searchable Liner Online). For each storage liner and associated waste container, Sealion tracks the physical configuration, radiological data (e.g., source term, transuranic content, fissile content, and direct gamma radiation reading), Resource Conservation and Recovery Act characterization data, contents descriptions, and a variety of other waste management data. Historical hard-copy records were scanned and are stored in the database for easy access. In addition to storing the consolidated data in a library for easy retrieval or linking, Sealion serves as a tool in the development of batching plans for retrieving, transporting, processing, and, ultimately, dispositioning the waste. An integral search function allows the user to query for a variety of parameters in order to plan custom batches and account for facility or regulatory limitations (e.g., U.S. Department of Transportation limits, hazard category determinations, and fissile gram equivalent limitations). Liners can be combined or batched together and the combined results displayed in real-time graphs and tables showing the cumulative characteristics. The basic database architecture has proven to be adaptable to a variety of other similar applications. Sealion is capable of tracking segmented inventories (i.e., the liners can be replaced with storage drums, racks in a warehouse, or grids overlaid on a landfill). Additionally, the batching functions allow for the ability to combine inventory sub-locations into real-time graphs that summarize the characteristics of the contents for ease in comparison of characteristics to established thresholds or decision-making modeling needed to support waste-management operations.

  15. Concurrency control in heterogeneous distributed database systems

    E-Print Network [OSTI]

    Rahman, Md. Rezaur

    1992-01-01T23:59:59.000Z

    APPROACHES IN HDDBS . III. A Approaches Requiring Local DBMS Modihcations 17 19 III. B Approaches Without Local DBMS Modifications 22 IV A NEW APPROACH TO HDDBS CONCURRENCY CONTROL 30 IV. A The Concurrency Control Scheme 30 CIIA PTER Page IV. B... related to Database Systems in general which will be used consistently throughout this thesis. A Database system (DBS) consists of a set of dutiibiises (DB) which contain the data of interest and software, the database msnageinent system (DBMS), which...

  16. Serving database information using a flexible server in a three tier architecture

    SciTech Connect (OSTI)

    Lee Lueking et al.

    2003-08-11T23:59:59.000Z

    The D0 experiment at Fermilab relies on a central Oracle database for storing all detector calibration information. Access to this data is needed by hundreds of physics applications distributed worldwide. In order to meet the demands of these applications from scarce resources, we have created a distributed system that isolates the user applications from the database facilities. This system, known as the Database Application Network (DAN) operates as the middle tier in a three tier architecture. A DAN server employs a hierarchical caching scheme and database connection management facility that limits access to the database resource. The modular design allows for caching strategies and database access components to be determined by runtime configuration. To solve scalability problems, a proxy database component allows for DAN servers to be arranged in a hierarchy. Also included is an event based monitoring system that is currently being used to collect statistics for performance analysis and problem diagnosis. DAN servers are currently implemented as a Python multithreaded program using CORBA for network communications and interface specification. The requirement details, design, and implementation of DAN are discussed along with operational experience and future plans.

  17. Top Resources | Commercial Buildings Resource Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Programs & Offices Consumer Information Commercial Buildings Resource Database Resources to support the adoption of energy-saving building technologies Search form Search...

  18. COSC6340: Database Systems Instructor: Carlos Ordonez

    E-Print Network [OSTI]

    Ordonez, Carlos

    available. Topics include the following. Database design: ER model, relational model and algebra, indexing data structures, query optimizer, concurrency control, transaction processing, recovery. Advanced

  19. A Database Index to Large Biological Sequences

    E-Print Network [OSTI]

    Hunt, E.

    Hunt,E. Atkinson,M.P. Irving,R.W. Proceedings of the 27th Conference on Very Large Databases pp 139-148 Morgan Kaufmann

  20. DEPOT database: Reference manual and user's guide

    SciTech Connect (OSTI)

    Clancey, P.; Logg, C.

    1991-03-01T23:59:59.000Z

    DEPOT has been developed to provide tracking for the Stanford Linear Collider (SLC) control system equipment. For each piece of equipment entered into the database, complete location, service, maintenance, modification, certification, and radiation exposure histories can be maintained. To facilitate data entry accuracy, efficiency, and consistency, barcoding technology has been used extensively. DEPOT has been an important tool in improving the reliability of the microsystems controlling SLC. This document describes the components of the DEPOT database, the elements in the database records, and the use of the supporting programs for entering data, searching the database, and producing reports from the information.

  1. Managing Multiple Isolation Levels in Middleware Database Replication Protocols

    E-Print Network [OSTI]

    Muńoz, Francesc

    ´e-Gisbert, Ra´ul Salinas-Monteagudo, Luis Ir´un-Briz, Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform. Bernab´e-Gisbert, Ra´ul Salinas-Monteagudo, Luis Ir´un-Briz, Francesc D. Mu~noz-Esco´i Instituto Tecnol

  2. Comp 5311 Database Management Systems 4. Structured Query Language

    E-Print Network [OSTI]

    Papadias, Dimitris

    ;5 Query 1: Find the total number of copies in stock for each poet SELECT poet, SUM (copies_in_stock) as sum FROM writer GROUP BY poet poet sum Douglas Livingstone 23 Mongane Wally 13 poet book copies Wally Must Weep 8 Mongane Wally A Tough Tale 2 #12;6 Query 2: For each poet, find the max, min, avg

  3. Museums and Online Archives Collaboration Digital Asset Management Database

    E-Print Network [OSTI]

    California at Berkeley, University of

    , labor, and technical capacity limit the ability of museums and libraries to share digital content://bampfa.berkeley.edu/moac. Project Goals & Objectives * Enhance interoperability, integration, and seamless access to digital library and libraries wishing to share digital content in standards-based, national-level, content gateway projects

  4. Managing Schema Changes in ObjectRelationship Databases ?

    E-Print Network [OSTI]

    Boudjlida, Nacer

    data schema versions is also needed. For these rea­ sons, support for full schema evolution is a required facility in any DB system. Full schema evolution concerns schema change or modiøcation, instance deønes the facet mechanism and shows its use in schema evolution. We end the paper by implementation

  5. Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    E-Print Network [OSTI]

    Snodgrass, Richard T.

    performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data to a particular kind of invariant. We realize these techniques, in concert termed micro-specialization, via a DBMS-independent run-time environment and apply them to a high- performance open-source DBMS, PostgreSQL. We show

  6. A Capacity Planning Study of Database Management Systems with

    E-Print Network [OSTI]

    are a study of DBMS tuning factors influencing its performance under OLAP workload, the design and validation of a queueing network model to capture the main features of the DBMS behavior, and the use of a quantitative approach to project the DBMS performance with OLAP workload. We built a workload model for OLAP, which

  7. EERE Project Management Center Database PIA, The Office of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrack graphics4Dimitri Kusnezov5 AnCool DownThereEfficiency

  8. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  9. Wyoming Interagency Spatial Database & Online Management | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin: EnergyWyandanch, New York:State Parks and Historic Sites

  10. Sandia Wind Turbine Loads Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Sandia Wind Turbine Loads Database is divided into six files, each corresponding to approximately 16 years of simulation. The files are text files with data in columnar format. The 424MB zipped file containing six data files can be downloaded by the public. The files simulate 10-minute maximum loads for the NREL 5MW wind turbine. The details of the loads simulations can be found in the paper: “Decades of Wind Turbine Loads Simulations”, M. Barone, J. Paquette, B. Resor, and L. Manuel, AIAA2012-1288 (3.69MB PDF). Note that the site-average wind speed is 10 m/s (class I-B), not the 8.5 m/s reported in the paper.

  11. Catalog of databases and reports

    SciTech Connect (OSTI)

    Burtis, M.D. [comp.

    1997-04-01T23:59:59.000Z

    This catalog provides information about the many reports and materials made available by the US Department of Energy`s (DOE`s) Global Change Research Program (GCRP) and the Carbon Dioxide Information Analysis Center (CDIAC). The catalog is divided into nine sections plus the author and title indexes: Section A--US Department of Energy Global Change Research Program Research Plans and Summaries; Section B--US Department of Energy Global Change Research Program Technical Reports; Section C--US Department of Energy Atmospheric Radiation Measurement (ARM) Program Reports; Section D--Other US Department of Energy Reports; Section E--CDIAC Reports; Section F--CDIAC Numeric Data and Computer Model Distribution; Section G--Other Databases Distributed by CDIAC; Section H--US Department of Agriculture Reports on Response of Vegetation to Carbon Dioxide; and Section I--Other Publications.

  12. Environmental remediation and waste management information systems

    SciTech Connect (OSTI)

    Harrington, M.W.; Harlan, C.P.

    1993-12-31T23:59:59.000Z

    The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

  13. Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific

    E-Print Network [OSTI]

    Ohta, Shigemi

    Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific information that has been gathered over 50 years of low-energy nuclear physics research worldwide. These powerful databases have enormous value and they represent a genuine national resource. Six core nuclear

  14. U.S. LIFE CYCLE INVENTORY DATABASE Goals of the U.S. LCI Database Project

    E-Print Network [OSTI]

    U.S. LIFE CYCLE INVENTORY DATABASE ROADMAP rsed e #12;Goals of the U.S. LCI Database Project. Vision Statement The U.S. Life Cycle Inventory Database will be the recognized source of U.S.-based, quality, transparent life cycle inventory data and will become an integral part of the rapidly expanding

  15. To appear: Proceedings 2002 National Conference on Beach Preservation Technology, FSBPA. FEDERAL INLETS DATABASE

    E-Print Network [OSTI]

    US Army Corps of Engineers

    To appear: Proceedings 2002 National Conference on Beach Preservation Technology, FSBPA. FEDERAL and unpublished knowledge of specific inlets in the United States. INTRODUCTION The U.S. Army Corps of Engineers to fully populate it. The Federal Inlets Database will 1) Applied Technology and Management, Inc., 2770 NW

  16. The Ecobase Project: Database and Web Technologies for Environmental Information Systems

    E-Print Network [OSTI]

    Bouganim, Luc

    a profound impact on our ability to protect our environment, manage natural resources, prevent and respondThe Ecobase Project: Database and Web Technologies for Environmental Information Systems Ecobase in the context of several environmental applications in Brazil and Europe. We propose a distributed architecture

  17. Core Curriculum / 18 credits IS 6420 Database Theory and Design 3

    E-Print Network [OSTI]

    Tipple, Brett

    and Analytics, Software and Systems Architecture, Product and Process Management, and IT Security. The new Analytics 3 IS 6571 IT Forensics 3 IS 6570 IT Security 3 ACCTG 6520 IT Risks and Controls 3 The MSIS programCore Curriculum / 18 credits IS 6420 Database Theory and Design 3 IS 6410 Information Systems

  18. Development of specialized electronic bibliographic databases for deep ocean hydrocarbon production and transportation 

    E-Print Network [OSTI]

    Mahendran, Joseph Anthony

    1992-01-01T23:59:59.000Z

    information in a manageable form. The developed specialized bibliographic databases contain information located under different headings and present the information under those particular headings chronologically. Subjects include oil spills of various... origins; geological hazards; naturally occurring hydrocarbon seeps; fates and effects of oil spills; major results of pertinent engineering, physical, chemical, ecological, geophysical studies, and satellite oceanographic research. A microcomputer...

  19. MIRROR: A StateConscious Concurrency Control Protocol for Replicated RealTime Databases \\Lambda

    E-Print Network [OSTI]

    Stankovic, John A.

    University of Virginia Charlottesville, VA 22903 stankovic@cs.virginia.edu Abstract Data replication can help MIRROR (Managing Isolation in Replicated Real­time Object Repositories), a con­ currency control protocol Foundation Grant EIA­9900895. 1 #12; (non­real­time) database system, (b) MIRROR provides the best

  20. The integration of digitized images, databases, and inventory protocol in an inventory updating program

    E-Print Network [OSTI]

    Wright, Charles Timothy

    1993-01-01T23:59:59.000Z

    is known as a database management system (DBMS). Among a DBMS's advantages (Humphrey and Biagio, 1986; Loucopoulos and Zicari, 1992) are the ability to query data, assurance of consistency of stored data, and the ability to share data with many users...

  1. Extracting UML/OCL Integrity Constraints and Derived Types from Relational Databases

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    the process different for each database management system (DBMS). To facilitate the comprehension of the enforced rules and their evolution, we be- lieve the rules must be described using an homogeneous for the Oracle DBMS. Moreover, our solution is based on the principles of Model Driven Engineering (MDE) which

  2. To Appear in ACM SIGMOD Record December 2005 From Databases to Dataspaces

    E-Print Network [OSTI]

    Halevy, Alon

    A Database Management System (DBMS) is a generic repository for the storage and querying of structured data. A DBMS offers a suite of interrelated services and guarantees that enables developers to focus today it is rarely the case that all the data can be fit nicely into a conventional re- lational DBMS

  3. Integrating and Querying Source Code of Programs Working on a Database

    E-Print Network [OSTI]

    Ordonez, Carlos

    management system (DBMS). As a result, we present QDPC, a novel system that allows the inte- gration and flexible querying within a DBMS of source code and a database's schema. The integration focuses on obtain a DBMS. These sum- marization tables are then analyzed with SQL queries to find matches that are related

  4. Database Systems Performance Evaluation Subharthi Paul subharthipaul@gmail.com (A project report written under

    E-Print Network [OSTI]

    Jain, Raj

    seen a huge transformation in the way businesses are conducted. There has been a paradigm shift from at other means to gain higher visibility and customer satisfaction, maintaining all the while their core that has spurred and aided this enormous movement. More specifically, database management systems now form

  5. Exploring challenges and strategies when using medical databases in research: a review 

    E-Print Network [OSTI]

    Calanzani, Natalia; Vojt, Gaby; Campbell, Christine; Weller, David

    2014-08-26T23:59:59.000Z

    The use of medical databases in research is well-established in the UK, and is likely to intensify further with the launch of the care.data programme in England. However, managing and analysing these datasets is not straightforward. Specialised...

  6. Universal Hashing and Multiple Authentication M. Atici1*2and 11. R,. S t i n ~ o n ' > ~

    E-Print Network [OSTI]

    Bernstein, Daniel

    authentication without secrecy. Our point of view is the uni- vcrsal hashing approach pioneered by Wegman,ions, and obtained some improvements to the Wegman-Carter construction. Since 1991, several authors have given im

  7. Database Transposition for Constrained (Closed) Pattern Mining

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Database Transposition for Constrained (Closed) Pattern Mining Baptiste Jeudy1 and Fran¸cois Rioult-Normandie, France. francois.rioult@info.unicaen.fr Abstract. Recently, different works proposed a new way to mine). In this case, mining the "transposed" database runs through a smaller search space, and the Ga- lois connection

  8. Novanet Libcasts BASIC Searching an EBSCO database

    E-Print Network [OSTI]

    Brownstone, Rob

    interface. Dal Libraries Database Search Screen with PsycINFO as search term. Click search. Open Database First let's consider our search terms. In advanced search you can combine search words in a variety some terms. TV, violence and children are three terms we can use to begin our search. Place an asterisk

  9. AIAA 033726 Preliminary DNS Database of

    E-Print Network [OSTI]

    Martín, Pino

    technology. In a high-speed boundary layer, the ki- netic energy is substantial and the dissipation dueAIAA 03­3726 Preliminary DNS Database of Hypersonic Turbulent Boundary Layers M. Pino Martin­4344 #12;Preliminary DNS Database of Hypersonic Turbulent Boundary Layers M. Pino Martin Department

  10. Publication Kind Codes in STN Patent Databases

    E-Print Network [OSTI]

    Hoffmann, Armin

    Publication Kind Codes in STN Patent Databases Dokumentenart-Codes in STN-Patentdatenbanken Imprint Abstracts (CAPLUS), Chemical Abstracts (CAPLUS), Derwent World Patents Index (DWPI), and Derwent World Patents Index (DWPI)und INPADOCDB INPADOCDB international patent databases, together with a short

  11. Evolution towards, in, and beyond Object Databases

    E-Print Network [OSTI]

    Scholl, Marc H.

    Evolution towards, in, and beyond Object Databases Marc H. Scholl and Markus Tresch Faculty ``evolution'' in the database arena. This paper tries to categorize some of these into a unique framework of ``external services'' to enrich DBMS functionalities. The following are presented in more detail: first, we

  12. NUCLEAR THERMODYNAMIC DATABASE MOX-TDB

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    NUCLEAR THERMODYNAMIC DATABASE « MOX-TDB » Ba-Fe-La-O-Pu-Ru-Sr-U-Zr + Ar-H Version 2006-01 6 rue du hal-00160137,version1-5Jul2007 #12;MOX-TDB Nuclear Thermodynamic Database Version 2006-01 developed examined and rechecked before final conclusions are drawn. hal-00160137,version1-5Jul2007 #12;MOX

  13. Documentation for database.txt Description

    E-Print Network [OSTI]

    Gilchrist, Michael A.

    . The database should also be importable into standard statistical programs such as SAS, R, or SPlus. Reference querying. Instead we recommend that researchers write their own Perl program for database querying Gilchrist, M.A., L.A. Salter,and A.Wagner. 2003. A statistical framework for combining and interpreting

  14. DATA QUALITY IN GENOME DATABASES (Research Paper)

    E-Print Network [OSTI]

    Weske, Mathias

    DATA QUALITY IN GENOME DATABASES (Research Paper) Heiko MĂĽller Humboldt University Berlin, Germany@dbis.informatik.hu-berlin.de Abstract: Genome databases store data about molecular biological entities such as genes, proteins, diseases is their importance in the process of drug discovery. Genome data is analyzed and interpreted to gain so-called leads

  15. Evolution of the Configuration Database Design

    SciTech Connect (OSTI)

    Salnikov, A

    2006-04-19T23:59:59.000Z

    The BABAR experiment at SLAC successfully collects physics data since 1999. One of the major parts of its on-line system is the configuration database which provides other parts of the system with the configuration data necessary for data taking. Originally the configuration database was implemented in the Objectivity/DB ODBMS. Recently BABAR performed a successful migration of its event store from Objectivity/DB to ROOT and this prompted a complete phase-out of the Objectivity/DB in all other BABAR databases. It required the complete redesign of the configuration database to hide any implementation details and to support multiple storage technologies. In this paper we describe the process of the migration of the configuration database, its new design, implementation strategy and details.

  16. Design and Implementation of the CEBAF Element Database

    SciTech Connect (OSTI)

    Theodore Larrieu, Christopher Slominski, Michele Joyce

    2011-10-01T23:59:59.000Z

    With inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a first step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting front-end computers to building controls screens. A particular requirement influencing the CED design is that it must provide consistent access to not only present, but also future, and eventually past, configurations of the CEBAF accelerator. To accomplish this, an introspective database schema was designed that allows new elements, element types, and element properties to be defined on-the-fly without changing table structure. When used in conjunction with the Oracle Workspace Manager, it allows users to seamlessly query data from any time in the database history with the exact same tools as they use for querying the present configuration. Users can also check-out workspaces and use them as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented API that is translated automatically from original C++ into native libraries for script languages such as perl, php, and TCL making access to the CED easy and ubiquitous. Notice: Authored by Jefferson Science Associates, LLC under U.S. DOE Contract No. DE-AC05-06OR23177. The U.S. Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce this manuscript for U.S. Government purposes.

  17. Ris-R-1301(EN) Database on Wind Characteristics

    E-Print Network [OSTI]

    Risř-R-1301(EN) Database on Wind Characteristics Contents of Database Bank Gunner C. Larsen Risř XVII, Database on Wind Characteristics - Contents of the database Abstract The main objective of IEA R&D Wind Annex XVII - Database on Wind Characteristics - is to provide wind energy planners and designers

  18. Collod-Broud & Boileau The Marfan Mutation Database

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Collod-Béroud & Boileau The Marfan Mutation Database Gwenaëlle Collod-Béroud1 and Catherine Boileau created, in 1995, a mutation database named "UMD-FBN1". The database follows the guidelines on mutation databases of the Hugo Mutation Database Initiative and gives access to a software package that provides

  19. BDDR, a new CEA technological and operating reactor database

    SciTech Connect (OSTI)

    Soldevilla, M.; Salmons, S.; Espinosa, B. [CEA-Saclay, CEA/DEN/DANS/DM2S/SERMA, 91191 Gif-sur-Yvette (France); Clanet, M.; Boudin, X. [CEA-Bruyeres-le-Chatel, 91297 Arpajon (France)

    2013-07-01T23:59:59.000Z

    The new application BDDR (Reactor database) has been developed at CEA in order to manage nuclear reactors technological and operating data. This application is a knowledge management tool which meets several internal needs: -) to facilitate scenario studies for any set of reactors, e.g. non-proliferation assessments; -) to make core physics studies easier, whatever the reactor design (PWR-Pressurized Water Reactor-, BWR-Boiling Water Reactor-, MAGNOX- Magnesium Oxide reactor-, CANDU - CANada Deuterium Uranium-, FBR - Fast Breeder Reactor -, etc.); -) to preserve the technological data of all reactors (past and present, power generating or experimental, naval propulsion,...) in a unique repository. Within the application database are enclosed location data and operating history data as well as a tree-like structure containing numerous technological data. These data address all kinds of reactors features and components. A few neutronics data are also included (neutrons fluxes). The BDDR application is based on open-source technologies and thin client/server architecture. The software architecture has been made flexible enough to allow for any change. (authors)

  20. The Impact of Electronic Bibliographic Databases and Electronic Journal Articles on the Scholar's Information-Seeking Behavior and Personal Collection of "Reprints"

    E-Print Network [OSTI]

    McGeachin, Robert B.

    2004-01-01T23:59:59.000Z

    This article examines the potential changes to the information seeking behavior of scholars and how they manage their own collection of research article “reprints”. With bibliographic databases and electronic journals provided by academic libraries...

  1. The Impact of Electronic Bibliographic Databases and Electronic Journal Articles on the Scholar's Information-Seeking Behavior and Personal Collection of "Reprints" 

    E-Print Network [OSTI]

    McGeachin, Robert B.

    2004-01-01T23:59:59.000Z

    This article examines the potential changes to the information seeking behavior of scholars and how they manage their own collection of research article “reprints”. With bibliographic databases and electronic journals provided by academic libraries...

  2. National Spill Test Technology Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Sheesley, David [Western Research Institute

    Western Research Institute established, and ACRC continues to maintain, the National Spill Technology database to provide support to the Liquified Gaseous Fuels Spill Test Facility (now called the National HAZMAT Spill Center) as directed by Congress in Section 118(n) of the Superfund Amendments and Reauthorization Act of 1986 (SARA). The Albany County Research Corporation (ACRC) was established to make publicly funded data developed from research projects available to benefit public safety. The founders since 1987 have been investigating the behavior of toxic chemicals that are deliberately or accidentally spilled, educating emergency response organizations, and maintaining funding to conduct the research at the DOEĆs HAZMAT Spill Center (HSC) located on the Nevada Test Site. ACRC also supports DOE in collaborative research and development efforts mandated by Congress in the Clean Air Act Amendments. The data files are results of spill tests conducted at various times by the Silicones Environmental Health and Safety Council (SEHSC) and DOE, ANSUL, Dow Chemical, the Center for Chemical Process Safety (CCPS) and DOE, Lawrence Livermore National Laboratory (LLNL), OSHA, and DOT; DuPont, and the Western Research Institute (WRI), Desert Research Institute (DRI), and EPA. Each test data page contains one executable file for each test in the test series as well as a file named DOC.EXE that contains information documenting the test series. These executable files are actually self-extracting zip files that, when executed, create one or more comma separated value (CSV) text files containing the actual test data or other test information.

  3. International Energy Agency Implementing Agreements and Annexes: A Guide for Building Technologies Program Managers

    E-Print Network [OSTI]

    Evans, Meredydd

    2008-01-01T23:59:59.000Z

    Energy Agency INDEEP International Database on Demand-Side Management Technologiesenergy assessment and analysis methodology/protocol and Energy Assessment Guide Develop a database of “Energy Saving Technologies energy assessment and analysis methodology/protocol and Energy Assessment Guide Develop a database of “Energy Saving Technologies 

  4. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  5. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    SciTech Connect (OSTI)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27T23:59:59.000Z

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  6. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  7. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01T23:59:59.000Z

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  8. Utilitas and venustas: balancing utility and authenticity in the stewardship of our built heritage

    E-Print Network [OSTI]

    Reich, Alene Wilmoth

    2007-04-25T23:59:59.000Z

    Members, John Alexander John Nichols Head of Department, Mardelle Shepley December 2005 Major Subject: Architecture iii ABSTRACT Utilitas and Venustas: Balancing Utility and Authenticity in the Stewardship of Our Built... Services (HPS). The aim of HPS is to, ?[help] our nation's citizens and communities identify, evaluate, protect and preserve historic properties for future generations of Americans.?17 HPS is responsible for the administration of educational, technical...

  9. Asynchronous data change notification between database server and accelerator controls system

    SciTech Connect (OSTI)

    Fu, W.; Morris, J.; Nemesure, S.

    2011-10-10T23:59:59.000Z

    Database data change notification (DCN) is a commonly used feature. Not all database management systems (DBMS) provide an explicit DCN mechanism. Even for those DBMS's which support DCN (such as Oracle and MS SQL server), some server side and/or client side programming may be required to make the DCN system work. This makes the setup of DCN between database server and interested clients tedious and time consuming. In accelerator control systems, there are many well established software client/server architectures (such as CDEV, EPICS, and ADO) that can be used to implement data reflection servers that transfer data asynchronously to any client using the standard SET/GET API. This paper describes a method for using such a data reflection server to set up asynchronous DCN (ADCN) between a DBMS and clients. This method works well for all DBMS systems which provide database trigger functionality. Asynchronous data change notification (ADCN) between database server and clients can be realized by combining the use of a database trigger mechanism, which is supported by major DBMS systems, with server processes that use client/server software architectures that are familiar in the accelerator controls community (such as EPICS, CDEV or ADO). This approach makes the ADCN system easy to set up and integrate into an accelerator controls system. Several ADCN systems have been set up and used in the RHIC-AGS controls system.

  10. The volatile compound BinBase mass spectral database

    E-Print Network [OSTI]

    Skogerson, Kirsten; Wohlgemuth, Gert; Barupal, Dinesh K; Fiehn, Oliver

    2011-01-01T23:59:59.000Z

    B, Eriksson R: SuperScent-a database of flavors and scents.Sayaed AM: The Pherobase: Database of Insect Pheromones andA public study design database for metabolomics projects.

  11. DATE A DAtabase of TIM Barrel 2.1 Introduction......................................................................................

    E-Print Network [OSTI]

    Babu, M. Madan

    24 DATE ­ A DAtabase of TIM Barrel Enzymes 2.1 Introduction...................................................................................... 2.2 Objective and salient features of the database .................................... 2.2.1 Choice on the database............................................... 2.4 Features

  12. Database Structure and Visualization Software for Microbial Physiology Data INTRODUCTION

    E-Print Network [OSTI]

    Database Structure and Visualization Software for Microbial Physiology Data INTRODUCTION Nicholas includes database input. Other related information can be entered through the website. The relational structure of the database is responsible for associating related data · A structured query is sent

  13. Visiting Database Programmer/Application Developer School of Chemical Sciences

    E-Print Network [OSTI]

    Zimmerman, Steven C.

    Visiting Database Programmer/Application Developer School of Chemical Sciences University professional as Visiting Database Programmer/Application Developer. This position reports to the Information administrative database environment (specifically Oracle and SQL Server). This is a visiting position, but may

  14. SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bdard, Suzie Larrive

    E-Print Network [OSTI]

    SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bédard, Suzie Larrivée Dept of Geomatics Sciences Centre for Research in Geomatics Canada NSERC Industrial Research Chair in Geospatial Databases language extension, Spatial data modeling, Perceptory pictograms. DEFINITION "Spatial databases" consist

  15. A report on the investigation of the Cefas monitoring database

    E-Print Network [OSTI]

    A report on the investigation of the Cefas monitoring database for incidences of high activities of the Cefas monitoring database for incidences of high activities in mollusc samples The Centre. Cefas' monitoring database ................................................... 3 4. Data Analysis

  16. Data aggregation for capacity management

    E-Print Network [OSTI]

    Lee, Yong Woo

    2004-09-30T23:59:59.000Z

    This thesis presents a methodology for data aggregation for capacity management. It is assumed that there are a very large number of products manufactured in a company and that every product is stored in the database with its standard unit per hour...

  17. Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense Surveillance Systems integration Transport / Borde

    E-Print Network [OSTI]

    Rogers, John A.

    Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense

  18. Fault-tolerant distributed transactions for partitioned OLTP databases

    E-Print Network [OSTI]

    Jones, Evan P. C. (Evan Philip Charles), 1981-

    2012-01-01T23:59:59.000Z

    This thesis presents Dtxn, a fault-tolerant distributed transaction system designed specifically for building online transaction processing (OLTP) databases. Databases have traditionally been designed as general purpose ...

  19. EM Develops Database for Efficient Solutions to Nuclear Cleanup...

    Broader source: Energy.gov (indexed) [DOE]

    illustrate the benefits of the database. EM also shared the database with the UK's Nuclear Decommissioning Authority and the Canadian Nuclear Laboratories to identify remote...

  20. An Infrared Spectral Database for Detection of Gases Emitted...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Database for Detection of Gases Emitted by Biomass Burning. An Infrared Spectral Database for Detection of Gases Emitted by Biomass Burning. Abstract: We report the construction of...

  1. Database (Report) of U.S. CHP Installations Incorporating Thermal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Database (Report) of U.S. CHP Installations Incorporating Thermal Energy Storage (TES) andor Turbine Inlet Cooling (TIC), 2004 Database (Report) of U.S. CHP Installations...

  2. Regional Geology: GIS Database for Alternative Host Rocks and...

    Energy Savers [EERE]

    Regional Geology: GIS Database for Alternative Host Rocks and Potential Siting Guidelines Regional Geology: GIS Database for Alternative Host Rocks and Potential Siting Guidelines...

  3. Heat Flow Database Expansion for NGDS Data Development, Collection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU) Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU)...

  4. AVTA: 2012 Chevrolet Volt PHEV Downloadable Dynamometer Database...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chevrolet Volt PHEV Downloadable Dynamometer Database Reports AVTA: 2012 Chevrolet Volt PHEV Downloadable Dynamometer Database Reports The Vehicle Technologies Office's Advanced...

  5. AVTA: 2012 Toyota Prius PHEV Downloadable Dynamometer Database...

    Energy Savers [EERE]

    Toyota Prius PHEV Downloadable Dynamometer Database Reports AVTA: 2012 Toyota Prius PHEV Downloadable Dynamometer Database Reports The Vehicle Technologies Office's Advanced...

  6. Instructions on Entering Publications into the APS Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Methods to enter user publications into the APS publication database The APS Publications Database is a searchable compendium of information on results from research at the APS,...

  7. 6.893 Database Systems, Fall 2004

    E-Print Network [OSTI]

    Madden, Samuel R. (Samuel Ross), 1976-

    This course is designed to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, query optimization, query processing, and transactions. This ...

  8. The Proteomics Identifications database: 2010 update

    E-Print Network [OSTI]

    Vizcaino, Juan Antonio

    The Proteomics Identifications database (PRIDE, http://www.ebi.ac.uk/pride) at the European Bioinformatics Institute has become one of the main repositories of mass spectrometry-derived proteomics data. For the last 2 ...

  9. Towards Privacy Preserving of Forensic DNA Databases

    E-Print Network [OSTI]

    Liu, Sanmin

    2012-02-14T23:59:59.000Z

    Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

  10. GWIDD: Genome-wide protein docking database

    E-Print Network [OSTI]

    Kundrotas, Petras J.; Zhu, Zhengwei; Vasker, Ilya A.

    2009-11-09T23:59:59.000Z

    Structural information on interacting proteins is important for understanding life processes at the molecular level. Genome-wide docking database is an integrated resource for structural studies of protein–protein interactions on the genome scale...

  11. Enabling Geographical Queries to a Botanical Database 

    E-Print Network [OSTI]

    Sato, Go

    2011-11-25T23:59:59.000Z

    Conservation of the lowland savanna ecosystem in Belize Project (Defra 17-022) has created a database of savanna plant collections in the country. Some of the collections have accurate positional coordinates measured by GPS devices while the others...

  12. The LBNL Water Heater Retail Price Database

    E-Print Network [OSTI]

    Lekov, Alex; Glover, Julie; Lutz, Jim

    2000-01-01T23:59:59.000Z

    Olson, and Stuart Chaitkin (LBNL). We also want to thank ourand Mithra Moezzi, also of LBNL. This work was supported byLBNL – 44749 The LBNL Water Heater Retail Price Database

  13. Energy Citations Database (ECD) - Widget Code

    Office of Scientific and Technical Information (OSTI)

    script>

  14. Energy Citations Database (ECD) - Alerts Comments

    Office of Scientific and Technical Information (OSTI)

    Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

  15. Energy Citations Database (ECD) - Alerts Help

    Office of Scientific and Technical Information (OSTI)

    After you submit your new e-mail address, an e-mail will be sent to your existing Energy Citations Database Alerts e-mail address requesting that you confirm the change of...

  16. NATIONAL CARBON SEQUESTRATION DATABASE AND GEOGRAPHIC INFORMATION SYSTEM (NATCARB) FORMER TITLE-MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)

    SciTech Connect (OSTI)

    Timothy R. Carr

    2004-07-16T23:59:59.000Z

    This annual report describes progress in the third year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. The project assembled a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide (CO{sub 2}) geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project has been extended and expanded as a ''NATional CARBon Sequestration Database and Geographic Information System (NATCARB)'' to provide national coverage across the Regional CO{sub 2} Partnerships, which currently cover 40 states (http://www.natcarb.org). Advanced distributed computing solutions link database servers across the five states and other publicly accessible servers (e.g., USGS) into a single system where data is maintained and enhanced at the local level but is accessed and assembled through a single Web portal and can be queried, assembled, analyzed and displayed. This project has improved the flow of data across servers and increased the amount and quality of available digital data. The online tools used in the project have improved in stability and speed in order to provide real-time display and analysis of CO{sub 2} sequestration data. The move away from direct database access to web access through eXtensible Markup Language (XML) has increased stability and security while decreasing management overhead. The MIDCARB viewer has been simplified to provide improved display and organization of the more than 125 layers and data tables that have been generated as part of the project. The MIDCARB project is a functional demonstration of distributed management of data systems that cross the boundaries between institutions and geographic areas. The MIDCARB system addresses CO{sub 2} sequestration and other natural resource issues from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

  17. A High Energy Nuclear Database Proposal

    E-Print Network [OSTI]

    David A. Brown; Ramona Vogt

    2005-10-13T23:59:59.000Z

    We propose to develop a high-energy heavy-ion experimental database and make it accessible to the scientific community through an on-line interace. This database will be searchable and cross-indexed with relevant publications, including published detector descriptions. Since this database will be a community resource, it requires the high-energy nuclear physics community's financial and manpower support. This database should eventually contain all published data from the Bevalac, AGS and SPS to RHIC and LHC energies, proton-proton to nucleus-nucleus collisions as well as other relevant systems and all measured observables. Such a database would have tremendous scientific payoff as it makes systematic studies easier and allows simpler benchmarking of theoretical models to a broad range of old and new experiments. Furthermore, there is a growing need for compilations of high-energy nuclear data for applications including stockpile stewardship, technology development for intertial confinement fusion and target and source development for upcoming facilities such as the Next Linear Collider. To enhance the utility of this database, we propose periodically performing evaluations of the data and summarizing the results in topical reviews.

  18. DIP: The Database of Interacting Proteins

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The DIP Database catalogs experimentally determined interactions between proteins. It combines information from a variety of sources to create a single, consistent set of protein-protein interactions. By interaction, the DIP Database creators mean that two amino acid chains were experimentally identified to bind to each other. The database lists such pairs to aid those studying a particular protein-protein interaction but also those investigating entire regulatory and signaling pathways as well as those studying the organisation and complexity of the protein interaction network at the cellular level. The data stored within the DIP database were curated, both, manually by expert curators and also automatically using computational approaches that utilize the knowledge about the protein-protein interaction networks extracted from the most reliable, core subset of the DIP data. It is a relational database that can be searched by protein, sequence, motif, article information, and pathBLAST. The website also serves as an access point to a number of projects related to DIP, such as LiveDIP, The Database of Ligand-Receptor Partners (DLRP) and JDIP. Users have free and open access to DIP after login. [Taken from the DIP Guide and the DIP website] (Specialized Interface) (Registration Required)

  19. Development of the downhole dynamometer database

    SciTech Connect (OSTI)

    Waggoner, J.R.; Mansure, A.

    1997-02-01T23:59:59.000Z

    The Downhole Dynamometer Database is a compilation of test data collected with a set of five downhole tools built by Albert Engineering under contract to Sandia National Laboratories. The downhole dynamometer tools are memory tools deployed in the sucker rod string with sensors to measure pressure, temperature, load, and acceleration. The acceleration data is processed to yield position, so that a load vs. position dynagraph can be generated using data collected downhole. With five tools in the hole at one time, all measured data and computed dynagraphs from five different positions in the rod string are available. The purpose of the Database is to provide industry with a complete and high quality measurement of downhole sucker rod pumping dynamics. To facilitate use of the database, Sandia has developed a Microsoft Windows-based interface that functions as a visualizer and browser to the more than 40 MBytes of data. The interface also includes a data export feature to allow users to extract data from the database for use in their own programs. This paper includes a description of the downhole dynamometer tools, data collection program, database content, and a few illustrations of the data contained in the downhole dynamometer database.

  20. Ris-R-1472(EN) Database on Wind Characteristics

    E-Print Network [OSTI]

    Risř-R-1472(EN) Database on Wind Characteristics Contents of Database Bank, revision I Gunner C on Wind Characteristics Contents of the database, revision I Abstract The main objective of IEA R&D Wind Annex XVII - Database on Wind Characteristics - has been to provide wind energy planners, designers

  1. MARS CLIMATE DATABASE v5.1 USER MANUAL

    E-Print Network [OSTI]

    Spiga, Aymeric

    MARS CLIMATE DATABASE v5.1 USER MANUAL (ESTEC Contract 11369/95/NL/JG "Mars Climate Database for version 5.1 of the Mars Climate Database (MCD) de- veloped by LMD (Paris), AOPP (Oxford), Dept. Physics and the Centre National d'Etudes Spatiales. This is a database of atmospheric statistics compiled from Global Cli

  2. October 6, 1997 ITER L-Mode Con nement Database

    E-Print Network [OSTI]

    October 6, 1997 ITER L-Mode Con nement Database S.M. Kaye and the ITER Con nement Database Working Group Abstract This paper describes the content of an L-mode database that has been compiled with data, and Tore-Supra. The database consists of a total of 2938 entries, 1881 of which are in the L-phase while

  3. Data Preparation Process for the Buildings Performance Database

    E-Print Network [OSTI]

    LBNL-6724E Data Preparation Process for the Buildings Performance Database Claudine Y. Custodio Performance Database (BPD) includes empirically measured data from a variety of data sources with varying data quality within the database and to ensure that all database entries have sufficient data

  4. A Database of Invariant Rings Gregor Kemper, Elmar K

    E-Print Network [OSTI]

    Malle, Gunter

    A Database of Invariant Rings Gregor Kemper, Elmar K Ë? ording, Gunter Malle, B. Heinrich Matzat, Denis Vogel, and Gabor Wiese CONTENTS 1. Introduction 2. Concepts of the Database 3. An Example Session/8­2 (``Invariantentheorie endlicher Gruppen''). We announce the creation of a database of invariant rings. This database

  5. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use Chapter 7: Relational Database DesignChapter 7: Relational Database Design #12;©Silberschatz, Korth and Sudarshan7.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 7: Relational

  6. Managing Tipping Point Dynamics in Complex Construction Projects

    E-Print Network [OSTI]

    Ford, David N.

    -9364 2008 134:6 421 CE Database subject headings: Project management; Dynamic models; Simulation models from the Nuclear Regulatory Commission NRC 1982 and the Energy In- formation Administration EIA 1988

  7. March 23, 2008 Databases: Practical DB Design 1 Practical Database Design

    E-Print Network [OSTI]

    Adam, Salah

    approach towards development of information system, called, Information System Development Life Cycle. #12 of Information Systems in Organizations + Why Organizations Use DB Systems + Information System Life Cycle System Life Cycle ... Database DBMS Users Users #12;March 23, 2008 Databases: Practical DB Design 8

  8. Insights from the downhole dynamometer database

    SciTech Connect (OSTI)

    Waggoner, J.R.

    1997-03-01T23:59:59.000Z

    The Downhole Dynamometer Database is a compilation of test data collected with a set of five downhole tools built by Albert Engineering under contract to Sandia National Laboratories. The downhole dynamometer tools are memory tools deployed in the sucker rod string with sensors to measure pressure, temperature, load, and acceleration. The acceleration data is processed to yield position, so that a load vs. position dynagraph can be generated using data collected downhole. With five tools in the hole at one time, all measured data and computed dynagraphs from five different positions in the rod string are available. The purpose of the Database is to provide industry with a complete and high quality measurement of downhole sucker rod pumping dynamics. To facilitate use of the database, Sandia has developed a Microsoft Windows-based interface that functions as a visualizer and browser to the more than 40 MBytes of data. The interface also includes a data export feature to allow users to extract data from the database for use in their own programs. Following a brief description of the downhole dynamometer tools, data collection program, and database content, this paper will illustrate a few of the interesting and unique insights gained from the downhole data.

  9. Designing a future Conditions Database based on LHC experience

    E-Print Network [OSTI]

    Formica, Andrea; The ATLAS collaboration; Gallas, Elizabeth; Govi, Giacomo; Lehmann Miotto, Giovanna; Pfeiffer, Andreas

    2015-01-01T23:59:59.000Z

    The ATLAS and CMS Conditions Database infrastructures have served each of the respective experiments well through LHC Run 1, providing efficient access to a wide variety of conditions information needed in online data taking and offline processing and analysis. During the long shutdown between Run 1 and Run 2, we have taken various measures to improve our systems for Run 2. In some cases, a drastic change was not possible because of the relatively short time scale to prepare for Run 2. In this process, and in the process of comparing to the systems used by other experiments, we realized that for Run 3, we should consider more fundamental changes and possibilities. We seek changes which would streamline conditions data management, improve monitoring tools, better integrate the use of metadata, incorporate analytics to better understand conditions usage, as well as investigate fundamental changes in the storage technology, which might be more efficient while minimizing maintenance of the data as well as simplif...

  10. Mining Software Usage with the Automatic Library Tracking Database (ALTD)

    SciTech Connect (OSTI)

    Hadri, Bilel [ORNL; Fahey, Mark R [ORNL

    2013-01-01T23:59:59.000Z

    Tracking software usage is important for HPC centers, computer vendors, code developers and funding agencies to provide more efficient and targeted software support, and to forecast needs and guide HPC software effort towards the Exascale era. However, accurately tracking software usage on HPC systems has been a challenging task. In this paper, we present a tool called Automatic Library Tracking Database (ALTD) that has been developed and put in production on several Cray systems. The ALTD infrastructure prototype automatically and transparently stores information about libraries linked into an application at compilation time and also the executables launched in a batch job. We will illustrate the usage of libraries, compilers and third party software applications on a system managed by the National Institute for Computational Sciences.

  11. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5 Access

  12. ITER L-Mode Confinement Database

    SciTech Connect (OSTI)

    S.M. Kaye and the ITER Confinement Database Working Group

    1997-10-01T23:59:59.000Z

    This paper describes the content of an L-mode database that has been compiled with data from Alcator C-Mod, ASDEX, DIII, DIII-D, FTU, JET, JFT-2M, JT-60, PBX-M, PDX, T-10, TEXTOR, TFTR, and Tore-Supra. The database consists of a total of 2938 entries, 1881 of which are in the L-phase while 922 are ohmically heated (OH) only. Each entry contains up to 95 descriptive parameters, including global and kinetic information, machine conditioning, and configuration. The paper presents a description of the database and the variables contained therein, and it also presents global and thermal scalings along with predictions for ITER. The L-mode thermal confinement time scaling was determined from a subset of 1312 entries for which the thermal confinement time scaling was provided.

  13. A Customizable Database Server: MCS, a Flexible Resource for Astronomical Projects

    E-Print Network [OSTI]

    Luciano Nicastro; Giorgio Calderone

    2007-01-09T23:59:59.000Z

    Nowadays medium-large size astronomical projects have to face the management of a large amount of information and data. Dedicated data centres manage the collection of raw and processed data and consequently make them accessible, typically as static files, either via (s)ftp or http (web). However the various steps of data acquisition, archiving, processing and delivering are accomplished by different tools. The data production information (logging) is not always collected into relational databases tables causing long delays before people know about their existence. Luckily the use, in many cases, of standard file formats like FITS can help to track the data origin and processing status. As Virtual Observatory standards will become more common, things will quickly improve. Here we present a software library we implemented in order to use a unified model in astronomical data treatment. All the data are stored into the same database becoming available in different forms to different users with different privileges.

  14. Feature Level Clustering of Large Biometric Database

    E-Print Network [OSTI]

    Mehrotra, Hunny; Radhika, V Bhawani; Majhi, Banshidhar; Gupta, Phalguni

    2010-01-01T23:59:59.000Z

    This paper proposes an efficient technique for partitioning large biometric database during identification. In this technique feature vector which comprises of global and local descriptors extracted from offline signature are used by fuzzy clustering technique to partition the database. As biometric features posses no natural order of sorting, thus it is difficult to index them alphabetically or numerically. Hence, some supervised criteria is required to partition the search space. At the time of identification the fuzziness criterion is introduced to find the nearest clusters for declaring the identity of query sample. The system is tested using bin-miss rate and performs better in comparison to traditional k-means approach.

  15. The JANA Calibrations and Conditions Database API

    SciTech Connect (OSTI)

    David Lawrence

    2010-07-01T23:59:59.000Z

    Calibrations and conditions databases can be accessed from within the JANA Event Processing framework through the API defined in its JCalibration base class. The API is designed to support everything from databases, to web services to flat files for the backend. A Web Service backend using the gSOAP toolkit has been implemented which is particularly interesting since it addresses many modern cybersecurity issues including support for SSL. The API allows constants to be retrieved through a single line of C++ code with most of the context, including the transport mechanism, being implied by the run currently being analyzed and the environment relieving developers from implementing such details.

  16. Proc. 4th RADC Workshop on Multilevel Database Security, Rhode Island, April 1991, pages 122-126.

    E-Print Network [OSTI]

    Sandhu, Ravi

    22030-4444 1 INTRODUCTION A database management system DBMS is a superb tool for building e ective infor- mation systems. The widespread use of DBMS's across the board, from stand-alone personal computers at one and acceptance of this technology. It is therefore no surprise that there is signi cant interest in trusted DBMS

  17. Exam revision Database Systems Lecture 18

    E-Print Network [OSTI]

    Alechina, Natasha

    revision Example (coursework 5) · {Film} {Certificate} is a non-trivial functional dependency · {Cinema(A,B,C), candidate keys (A,B) and (A,C), fd B C. #12;Exam revision Example (coursework 5) · Relation ListingExam revision Database Systems Lecture 18 Natasha Alechina #12;Exam revision In This Lecture · Exam

  18. Exam revision Database Systems Lecture 18

    E-Print Network [OSTI]

    Alechina, Natasha

    ,B) and (A,C), fd B C. #12;3 Exam revision Example (coursework 5) · Relation Listing is not in 2NF because1 Exam revision Database Systems Lecture 18 Natasha Alechina Exam revision In This Lecture · Exam format · Main topics · How to revise Exam revision Exam format · Answer three questions out of five

  19. Identifying Relevant Databases for Multidatabase Mining

    E-Print Network [OSTI]

    Liu, Huan

    Identifying Relevant Databases for Multidatabase Mining Huan Liu, Hongjun Lu, Jun Yao Department,luhj,yaojung@iscs.nus.edu.sg Abstract. Various tools and systems for knowledge discovery and data mining are developed and available is where we should start mining. In this paper, breaking away from the conventional data mining assumption

  20. A Methodology Database System Performance Evaluation

    E-Print Network [OSTI]

    Liblit, Ben

    A Methodology for Database System Performance Evaluation Haran Boral Computer Science Department Technion - Israel Institute of Technology David J. DeWitt Computer Sciences Department University82-01870 and the Department of Energy under contract #DE-AC02-81ER10920. #12;ABSTRACT This paper